TOWARDS AN ALTERNATIVE WAY OF VERIFYING PROXY OBJECTS IN JINI

Nikolaos Papamichail, Luminita Vasiu

2004

Abstract

Jini networking technology represents an exciting paradigm in distributed systems. Its elegant approach in computer networking possesses immense advantages, but also generates security problems. Extensive research has been undertaken and existing security methodologies have been applied to provide a safe execution environment. However the unique nature of Jini has made it hard for traditional security mechanisms to be applied effectively. Part of the problem lies within the downloaded code and in the lack of centralised control. Current solutions are based on assumptions; therefore they are inadequate for enforcing the security requirements of the system. The goal of our research is to increase the security of the Jini model without altering its initial characteristics. We present our preliminary research efforts in providing an alternative, fault tolerant security architecture that uses a trusted local verifier in order to evaluate and certify the correctness of remote calls.

References

  1. Eronen, P., Lehtinen, J., Zitting, J., and Nikander, P., 2000. Extending Jini with Decentralized Trust Management. In Short Paper Proceedings of the 3rd IEEE Conference on Open Architectures and Network Programming (OPENARCH 2000), pages 25-29. Tel Aviv, Israel.
  2. Hasselmeyer, P., Kehr, R., and Voß M. 2000a.Trade-offs in a Secure Jini Service Architecture. In 3rd IFIP/GI International Conference on Trends towards a Universal Service Market (USM 2000), Munich, Germany. Springer Verlag, ISBN 3-540-41024-4, pp. 190-201.
  3. Java Authentication and Authorisation Service (JAAS) http://java.sun.com/products/jaas/ [Accessed 10 Feb. 2004]
  4. Jini specifications archive - v 2.0 http://java.sun.com/products/jini/1_2index.html [Accessed 10 Feb. 2004]
  5. Kagal, L., Finin T. and Peng, Y. 2001. A Delegation Based Model for Distributed Trust. In Proceedings of the IJCAI-01 Workshop on Autonomy, Delegation, and Control: Interacting with Autonomous Agents, pp 73-80, Seattle.
  6. Menezes, A., van Oorschot, P., and Vanstone S. 1996. Handbook of Applied Cryptography. CRC Press. ISBN: 0849385237
  7. Rescorla, E. 2000. HTTP Over TLS, the IETF Network Working Group http://www.ietf.org/rfc/rfc2818.txt [Accessed 09 Feb. 2004]
  8. Rivest, R. 1992. RFC 1321 - The MD5 Message-Digest Algorithm, the IETF Network Working Group, http://www.ietf.org/rfc/rfc1321.txt [Accessed 09 Feb. 2004]
  9. Scheifler, Bob 2002. Comprehensive Network Security for Jini Network Technology Java One Conference Presentation , San Francisco, March 2002 http://servlet.java.sun.com/javaone/sf2002/conf/sessio ns/display-1171.en.jsp [Accessed 15 Dec. 2003]
  10. Schoch, T., Krone, O., and Federrath, H. 2001. Making Jini Secure. In Proc. 4th International Conference on Electronic Commerce Research, pp. 276-286.
  11. Sun Microsystems Inc. 2003a. Jini architecture specification. http://www..sun.com/software/jini/specs/jini2_0.pdf [Accessed 15 Dec. 2003]
  12. Sun Microsystems Inc. 2003b. Jini architecture specification. http://wwws.sun.com/software/jini/specs/jini2_0.pdf [Accessed 15 Dec. 2003]
  13. http://www.jini.org/ [Accessed 11 Feb. 2004] The Davis project http://davis.jini.org/ [Accessed 11 Feb. 2004
Download


Paper Citation


in Harvard Style

Papamichail N. and Vasiu L. (2004). TOWARDS AN ALTERNATIVE WAY OF VERIFYING PROXY OBJECTS IN JINI . In Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 2: ICETE, ISBN 972-8865-15-5, pages 68-75. DOI: 10.5220/0001402000680075


in Bibtex Style

@conference{icete04,
author={Nikolaos Papamichail and Luminita Vasiu},
title={TOWARDS AN ALTERNATIVE WAY OF VERIFYING PROXY OBJECTS IN JINI},
booktitle={Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 2: ICETE,},
year={2004},
pages={68-75},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001402000680075},
isbn={972-8865-15-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 2: ICETE,
TI - TOWARDS AN ALTERNATIVE WAY OF VERIFYING PROXY OBJECTS IN JINI
SN - 972-8865-15-5
AU - Papamichail N.
AU - Vasiu L.
PY - 2004
SP - 68
EP - 75
DO - 10.5220/0001402000680075