A Java']Java beans component architecture for cryptographic protocols

被引:0
|
作者
Nikander, P [1 ]
Karila, A [1 ]
机构
[1] Helsinki Univ Technol, FIN-02150 Espoo, Finland
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Global networking has brought with it both new opportunities and new security threats on a worldwide scale. Since the Internet is inherently insecure, secure cryptographic protocols and a public key, infrastructure are needed. In this paper we introduce a protocol component architecture that is well suited for the implementation of telecommunications protocols in general and cryptographic protocols in particular Our implementation framework is based on the Java programming language and the Conduits+ protocol framework. It complies with the Beans architecture and security API of JDK 1.1, allowing its users to implement application specific secure protocols with relative ease. Furthermore, these protocols can be safely downloaded through the Internet and run on virtually any workstation equipped with a Java capable browser.* The framework has been implemented and tested in practice with a variety of cryptographic protocols. The framework is relatively, independent of the actual cryptosystems used and relies on the Java 1.1 public key security API. Future work will include Java 1.2 support, and utilization of a graphical Beans editor to further ease the work of the protocol composer.
引用
收藏
页码:107 / 121
页数:15
相关论文
共 50 条
  • [1] Software architecture and Java']Java Beans
    Stuurman, S
    SOFTWARE ARCHITECTURE, 1999, 12 : 183 - 199
  • [2] Java']Java security architecture and extensions - Application independence of cryptographic primitives
    Roth, V
    DR DOBBS JOURNAL, 2002, 27 (04): : 34 - +
  • [3] A Java']Java implementation of a component model with explicit symbolic protocols
    Pavel, S
    Noyé, J
    Poizat, P
    Royer, JC
    SOFTWARE COMPOSITION, 2005, 3628 : 115 - 124
  • [4] Component technologies: Java']Java beans, COM, CORBA, RMI, EJB and the CORBA component model
    Emmerich, W
    Kaveh, N
    ICSE 2002: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 2002, : 691 - 692
  • [5] Using Java']Java Beans to Realize a Domain-Specific Component Model
    Feljan, Juraj
    Carlson, Jan
    Zagar, Mario
    2009 35TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS, PROCEEDINGS, 2009, : 474 - +
  • [6] Java']Java Cryptographic Library for Smartphones
    Okida, C.
    Goya, D.
    Terada, R.
    IEEE LATIN AMERICA TRANSACTIONS, 2012, 10 (01) : 1377 - 1384
  • [7] Creating intelligent Java']Java Beans
    不详
    IEEE INTELLIGENT SYSTEMS & THEIR APPLICATIONS, 1997, 12 (06): : 70 - 71
  • [8] Java组件机制——Java beans
    刘广聪
    傅秀芬
    计算机与通信, 1998, (03) : 34 - 36
  • [9] Java']Java bashing, books, and beans
    Swaine, M
    DR DOBBS JOURNAL, 1997, 22 (07): : 93 - 95
  • [10] Aspects of enterprise Java']Java Beans
    Blank, G
    Vayngrib, G
    OBJECT-ORIENTED TECHNOLOGY: ECOOP'98 WORKSHOP READER, 1998, 1543 : 437 - 437