Secure Jini Service Architecture Providing Ubiquitous Services Having Persistent States |
Kim, Sung-Ki
(인천대학교 정보기술교육원)
Jung, Jin-Chul (인천대학교 컴퓨터공학과) Park, Kyung-No (인천대학교 컴퓨터공학과) Min, Byoung-Joon (인천대학교 컴퓨터공학과) |
1 | Sun Microsystems, “Jini Technology Starter Kit Overview v2.0,” Published Specification, http://java.sun.com/developer/products/jini/arch2_0.html, 2003 |
2 | Wang F., et al, “SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services,” DARPA Informa tion Survivability Conference & EXposition, 2001 |
3 | Sun Microsystems, “JiniTM Architecture Specification,” Published Specification, http://java.sun.com/products/jini/2. 0/doc/specs/html/jini-spec.html, 2003 |
4 | Byoung Joon Min, et al. “Committing Secure Results with Replicated Servers,” LNCS 3043, Springer-Verlag Berlin, 2004 |
5 | Sun Microsystems, “Jini Technology Core Platform Specification.” Communication of the ACM, Vol.39, No. 4, pp.75-83, 1996 |
6 | Johannes Osrael, et al.,“Using Replication to Build Highly Available .Net Applications,” Proceedings of the 17th International Conference on Database and Expert Systems Applications, pp.385-398, 2006 |
7 | Pasi Eronen and Pekka Nikander. “Decentralized Jini security,” In Proceedings of the Network and Distributed System Security Symposium (NDSS 2001), pages 161–172, San Diego, California, February 2001 |
8 | Thomas Schoch, et al. “Making Jini Secure,” Proc. 4th International Conference on Electronic Commerce Research, pages 276-286, Nov. 2001 |
9 | Sun Microsystems, “Java Secure Socket Extension(JSSE) Reference Guide for Java Platform Standard Edition 6,” http://java.sun.com/javase/6/docs/tech-notes/guides/security/jsse/JSSERefGuide.html#Features |
10 | Reynolds, J. et al, “The Design and Implementation of an Intrusion Tolerant System,” Proc. of Int'l Conference on Dependable Systems and Networks, 2002 |
11 | Marshall Pease, Robert Shostak, Leslie Lamport, “Reaching Agreement in the Presence of Faults,” Journal of the ACM 27/2 228-234 1980 DOI |
12 | Amir, Y. et. al., “Secure Group Communication Using Robust Contributory Key Agreement,” IEEE Transactions on Parallel and Distributed Systems, Vol.15, No.5, pp.468-480, May 2004 DOI ScienceOn |
13 | Marc Schonefeld. “Hunting Flaws in JDK,” In Blackhat Europe 2003. May 2003 |
14 | D.Szentivanyi and S. Nadjm-Tehrani, “Middleware Support for Fault Tolerance,” Chapter 28 in Middleware for Communications, Q. Mahmoud (Ed.), John Wiley & Sons, 2004 |
15 | Frank Sommers, “Jini Starter Kit 2.0 tightens Jini's security framework,” Los Alamitos, CA., IEEE Computer Society Press, 2003 |
16 | Hein Meling, et al., “Jgroup/ARM: a distributed object group platform with autonomous replication managements,” Software Practice and Experience, John Wiley & Sons, 2007 |
17 | Heine Kolltveit et al., “Preventing Orphan Requests by Integrating Replication and Transactions,” LNCS 4690, Springer-Verlag Berlin, 2007 DOI ScienceOn |
18 | Hein Meling, et al., “Performance Consequences of Inconsistent Client-side Membership Information in the Open Group Model,” Proceedings of the 23rd IEEE International Performance, Computing and Communications Conference. pp.777-782, 2004 DOI |
19 | M. Tichy, H. Giese. “An Architecture for Configurable Dependability of Application Services,” Proc. of the ICSE 2003 Workshop on Software Architectures for Dependable Systems. pp.65-70, Portland, OR. April 2003 |
20 | Peer Hasselmeyer, et al., “Trade-offs in a Secure Jini Service Architecture,” LNCS 1890, Springer-Verlag Berlin, 2000 DOI ScienceOn |