A Java']Java beans component architecture for cryptographic protocols

被引:0
|
作者
Nikander, P [1 ]
Karila, A [1 ]
机构
[1] Helsinki Univ Technol, FIN-02150 Espoo, Finland
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Global networking has brought with it both new opportunities and new security threats on a worldwide scale. Since the Internet is inherently insecure, secure cryptographic protocols and a public key, infrastructure are needed. In this paper we introduce a protocol component architecture that is well suited for the implementation of telecommunications protocols in general and cryptographic protocols in particular Our implementation framework is based on the Java programming language and the Conduits+ protocol framework. It complies with the Beans architecture and security API of JDK 1.1, allowing its users to implement application specific secure protocols with relative ease. Furthermore, these protocols can be safely downloaded through the Internet and run on virtually any workstation equipped with a Java capable browser.* The framework has been implemented and tested in practice with a variety of cryptographic protocols. The framework is relatively, independent of the actual cryptosystems used and relies on the Java 1.1 public key security API. Future work will include Java 1.2 support, and utilization of a graphical Beans editor to further ease the work of the protocol composer.
引用
收藏
页码:107 / 121
页数:15
相关论文
共 50 条
  • [21] Typechecking Java']Java Protocols with [St]Mungo
    Voinea, A. Laura
    Dardha, Ornela
    Gay, Simon J.
    FORMAL TECHNIQUES FOR DISTRIBUTED OBJECTS, COMPONENTS, AND SYSTEMS, FORTE 2020, 2020, 12136 : 208 - 224
  • [22] Implementing protocols in Java']Java: The price of portability
    Krupczak, B
    Calvert, KL
    Ammar, M
    IEEE INFOCOM '98 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS. 1-3: GATEWAY TO THE 21ST CENTURY, 1998, : 765 - 773
  • [23] Tutorial: Principles and Practices of Secure Cryptographic Coding in Java']Java
    Xiao, Ya
    Frantz, Miles
    Afrose, Sharmin
    Rahaman, Sazzadur
    Yao, Danfeng
    2020 IEEE SECURE DEVELOPMENT (SECDEV 2020), 2020, : 5 - 6
  • [24] A Framework for the Cryptographic Verification of Java']Java-like Programs
    Kuesters, Ralf
    Truderung, Tomasz
    Graf, Juergen
    2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 198 - 212
  • [25] A workcase-based distributed workflow architecture and its implementation using enterprize java']java beans framework
    Ahn, Hyung-Jin
    Kim, Kwang-Hoon
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 3, PROCEEDINGS, 2007, 4707 : 920 - +
  • [26] Java']Java enhanced service architecture
    Preuss, S
    2004 2ND IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS: COLLABORATIVE AUTOMATION - ONE KEY FOR INTELLIGENT INDUSTRIAL ENVIRONMENTS, 2004, : 474 - 478
  • [27] On the use of enterprise Java']Java Beans 2.0 local interfaces
    Schmid, HA
    SOFTWARE ENGINEERING AND MIDDLEWARE, 2003, 2596 : 144 - 156
  • [28] The architecture of a Java']Java coverage tool
    Dasiewicz, P
    2000 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, CONFERENCE PROCEEDINGS, VOLS 1 AND 2: NAVIGATING TO A NEW ERA, 2000, : 7 - 11
  • [29] Java']Java Security Architecture Revisited
    Gong, Li
    COMMUNICATIONS OF THE ACM, 2011, 54 (11) : 48 - 52
  • [30] Java Advisor: Roasting beans
    Unix Rev, 5 (29):