Security Solutions for Jini-Based Applications

Since its first release, Jini became a promising technology to build fault tolerant distributed systems. The actual Jini architecture however lacks a strong security model. Based on a concrete example, this paper aims at reviewing the main security architectures that have been proposed by the research community and presents an evaluation of them. This work may serve as a basis for securing Jini-based systems by selecting the set of solutions provided by each model, depending on the security needs introduced by each specific application.

[1]  Gary McGraw,et al.  Securing Java: getting down to business with mobile code , 1999 .

[2]  Denis Pinkas,et al.  SESAME: The solution to security for open distributed systems , 1994, Comput. Commun..

[3]  Pekka Nikander,et al.  Extending Jini with decentralized trust management , 2000 .

[4]  Joseph W. Yoder,et al.  Architectural Patterns for Enabling Application Security , 1998 .

[5]  Thomas Marcus Schoch An Authentication and Authorization Architecture for Jini Services , 2000 .

[6]  Sing Li,et al.  Professional Jini , 2000 .

[7]  Roy H. Campbell,et al.  Secure smart homes using Jini and UIUC SESAME , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).

[8]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[9]  Patrick Brézillon,et al.  A Generic Framework for Context-Based Distributed Authorizations , 2003, CONTEXT.

[10]  Pekka Nikander,et al.  Decentralized Jini Security , 2001, NDSS.

[11]  P. Nikander,et al.  Securing ad hoc Jini services , 2000 .

[12]  Peer Hasselmeyer,et al.  Trade-offs in a Secure Jini Service Architecture , 2000, USM.

[13]  Markus Schumacher,et al.  Security Engineering with Patterns , 2003, Lecture Notes in Computer Science.

[14]  Ghita Kouadri Mostéfaoui Security in Pervasive Environments, What's Next? , 2003, Security and Management.

[15]  W. Keith Edwards,et al.  Core Jini , 1999 .

[16]  Frank Yellin,et al.  Low Level Security in Java , 1995, WWW.

[17]  Hannes Federrath,et al.  Making Jini Secure , 2001 .

[18]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.