Concepts and experiments in computational reflection
OOPSLA '87 Conference proceedings on Object-oriented programming systems, languages and applications
Efficient dispersal of information for security, load balancing, and fault tolerance
Journal of the ACM (JACM)
Hierarchical object-oriented design
Hierarchical object-oriented design
Communications of the ACM
The Art of the Metaobject Protocol
The Art of the Metaobject Protocol
EDCC-2 Proceedings of the Second European Dependable Computing Conference on Dependable Computing
EDCC-1 Proceedings of the First European Dependable Computing Conference on Dependable Computing
Designing an Extensible Distributed Language with a Meta-Level Architecture
ECOOP '93 Proceedings of the 7th European Conference on Object-Oriented Programming
Intrusion Tolerance in Distributed Middleware
Information Systems Frontiers
Hi-index | 0.24 |
This paper discusses how object orientation in application design enables confidentiality aspects to be handled more easily than in conventional approaches. The approach is based on the Fragmentation-Redundancy-Scattering technique developed at LAAS-CNRS for several years. This technique and previous developments are briefly summarized. The idea developed in this paper is based on object fragmentation at design time for reducing data processing in confidential objects; the more non confidential objects can be produced at design-time, the more application objects can be processed on untrusted shared computers. Still confidential objects must be processed on non shared trusted workstations. Rules and limits of object fragmentation are discussed together with some criteria evaluating tradeoffs between fragmentation and performance. Finally, a distributed object-oriented support especially fitted for fragmented applications is briefly described.