Design and implementation of Jini-based secure event service using SPKI/SDSI certificate |
Park, Hee-Man
(Chonnam National University)
Kim, In-Su (Chonnam National University) Lee, Young-Lok (Chonnam National University) Lee, Hyung-Hyo (WonKwang University) Noh, Bong-Nam (Chonnam National University) |
1 | A. Rakotonirainy, J.Indulska, W.W Loke, A.Aaslavsky 'Middleware for Reactive Components: An Integrated Use of Context, Roles, and Event Based Coordination', Lecture Notes In Computer Science, Vol. 2218 77-98 |
2 | Dwaine Clarke, Jean-Emile Elien, Carl Ellison, Matt Fredette, Alexander Morcos, and Ronald L. Rivest, 'Certificate Chain Discovery in SPKI/SDSI,' Journal of Computer Security, vol9, Dec 2000 |
3 | Norman, D., 'The invisible computer: why good products can fail, the personal computer is so complex, and information appliances are the solution', MIT Press, 1998 |
4 | Manuel Roman, Christopher K. Hess, Renato Cerqueira, Anand Ranganathan, Roy H. Campbell, and Klara Nahrstedt 'Gaia:A Middleware Infrastructure to Enable Active Spaces.' In IEEE Pervasive Computing 74-83, Dec 2002 |
5 | Philip Bishop and Nigel, 'JavaSpaces IN PRACTICE', Addison-Wesley, 2003 |
6 | Carl M. Ellison, Bill. Frantz, Butler. Lampson, Ron Rivest, Brian M. Thomas, Tatu Ylonen, 'SPKI Certificate Theory' RFC2693, September 1999 |
7 | K.Sanzgiri, D.LaFlamme, B.Dahill, B.N.Levine, C.Shields, E.M.Belding Royer,'Authenticated routing for ad hoc networks', IEEE Journal on Selected Areas in Communications, March, 2005 |
8 | G. Navarro, J. Borrell, J. A. Ortega-Ruiz, S. Robles, 'Access control with safe role assignment for mobile agents', AGENTS: International Conference on Autonomous Agents, July 2005 |
9 | Object Management Group, 'The Common Object Request Broker : Architecture and Specification', 2.0 ed., July 1995 |
10 | Object-Orientated Concepts Inc, 'ORBacus for C++ and Java'. 1998 |
11 | David F. Ferraiolo, Ravi Sandhu, Serban Gavrila, D. Richard Kuhn, Ramaswamy Chandramoul, 'Proposed Nist Standard for Role-Based Access Control,' ACM Transactions on Information and System Security, Volume 4, Issue 3, pp. 224-274, August 2001 DOI |
12 | Roy Campbell, Jalal Al-Muhtadi, Prasad Naldurg, Geetanjali Sampemane, M. Dennis Mickunas, 'Towards Security and Privacy for Pervasive Computing' LECTURE NOTES IN COMPUTER SCIENCE 2609, 2003 |
13 | Bhaskar Borthakur, 'Event Service User Manuel', white paper, October 29, 2001 |
14 | Sun Microsystems, 'Jini(TM) Technology Core Platform Specifications', Sun Microsystems, 2005 |
15 | Bhaskar Borthakur, 'The Event Service, white paper', October 2001 |
16 | 최성재, 김용우, 이홍기, 송주석, 양대헌, '모바일 애드혹 네트워크의 안전하고 효과적인 최적의 인증경로 탐색 기법', 한국정보과학회논문지, 2005 |
17 | Carl M. Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian M. Thomas, Tatu Ylonen, 'SPKI Examples,' Internet-Draft, March 1998 |
18 | Sun Microsystems, 'Jini(TM) Architecture Specification', Sun Microsystems, 1997-2000 |
19 | Ravi S. Sandhu, Pierangela Samarati, 'Access Control: Principle and Practice,' IEEE communications Magazine, pp. 40-49, September 1994 |
20 | W.Keith Edwards, W.Edwards, 'Core Jini', Pearson Education, 2000 |
21 | 이영록 'RBAC 및 비밀통신 기능을 갖는 SPKI/SDSI HTTP 보안서버', 한국정보보호논문지, 2003 |
22 | Shiva Chetan, Anand Ranganathan, and Roy H. Campbell, 'Towards Fault Tolerant Pervasive Computing', In IEEE Technology and Society. Volume: 24, No. 1, pp 38-44, Spring 2005 DOI ScienceOn |