Security Solutions for Jini-Based Applications
نویسنده
چکیده
Since its first release, Jini became a promising technology to build fault tolerant distributed systems. The actual Jini architecture however lacks a strong security model. Based on a concrete example, this paper aims at reviewing the main security architectures that have been proposed by the research community and presents an evaluation of them. This work may serve as a basis for securing Jini-based systems by selecting the set of solutions provided by each model, depending on the security needs introduced by each specific application.
منابع مشابه
Decentralized Jini Security
Among the different approaches to distributed computing, the Jini technology provides a number of very promising methods for attacking the fundamental problems involved. Programs built according to the Jini principles will be able to function and survive in highly dynamic network environments, allowing applications to adapt their behaviour to the requirements of the current context. Unfortunate...
متن کاملConcepts and Capabilities of Middleware Security
Distributed computing applications for the twenty-first century, constructed from legacy, commercial-off-the-shelf (COTS), database, and new client/server applications, require stakeholders (i.e., software architects, system designers, security officers, etc.) to architect and prototype solutions that facilitate the interoperation of new and existing applications in a network-centric environmen...
متن کاملTowards an Alternative Way of Verifying Proxy Objects in JINI
Jini networking technology represents an exciting paradigm in distributed systems. Its elegant approach in computer networking possesses immense advantages, but also generates security problems. Extensive research has been undertaken and existing security methodologies have been applied to provide a safe execution environment. However the unique nature of Jini has made it hard for traditional s...
متن کاملTrade-offs in a Secure Jini Service Architecture
Jini is an infrastructure built on top of the mobile code facilities of the Java programming language enabling clients and services to spontaneously engage in arbitrary usage scenarios. For a small home or office environment the currently available infrastructure might be adequate, but for mission-critical applications it lacks essential security properties. In the sequel we identify weak point...
متن کاملSecurity Engineering for Roles and Resources in a Distributed Environment
One critical challenge to security for distributed applications (which consist of legacy, COTS, databases, clients, etc.) is managing access to available resources (and their APIs). An engineered solution is critical to insure that clients are restricted to select portions of resource APIs at different times and under specific conditions. This work offers a constraint-based role security model ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Int. Arab J. Inf. Technol.
دوره 1 شماره
صفحات -
تاریخ انتشار 2003