An Authentication and Authorization Architecture for Jini Services

class KeyPairGenerator { static KeyPairGenerator getInstance(String, String); void initialize(AlgorithmParameterSpec); final KeyPair genKeyPair(); ... } First, the instance is created by calling getInstance(), then it has to be initialized with some parameter which the algorithm needs and at least the key pair can be created by calling genKeyPair(). KeyPair is only a container class that stores the private and public key. 4.5.5 Usage of the Diffie Hellman Key Agreement Algorithm As mentioned above, the architecture suggests a default algorithm. The key agreement algorithm suggestion is the Diffie Hellmann key agreement algorithm (DH) which uses Diffie Hellman key pairs (DH). The parameters needed to generate the keys exponent and modulus are pregenerated, public and taken from Suns Diffie Hellman example program. DH is a one phase protocol, so that the doPhase() method has only to be called once with true as argument because the first phase is the last phase.

[1]  Li Gong,et al.  User authentication and authorization in the Java/sup TM/ platform , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).

[2]  Harald Vogt,et al.  Towards a generic proxy execution service for small devices , 1999 .

[3]  W. Keith Edwards,et al.  Core Jini , 1999 .

[4]  Michael Rohs,et al.  Mobile code as an enabling technology for service-oriented smartcard middleware , 2000, Proceedings DOA'00. International Symposium on Distributed Objects and Applications.

[5]  R. Sietmann,et al.  UNIVERSAL PLUG AND PLAY , 1999 .

[6]  Sape Mullender,et al.  Distributed systems , 1989 .

[7]  Svetlana Domnitcheva,et al.  A Framework for the Integration of Legacy Devices into a Jini Management Federation , 1999, DSOM.

[8]  Joachim Posegga,et al.  PCA: Jini-based Personal Card Assistant , 1999, CQRE.

[9]  George Coulouris,et al.  Distributed systems - concepts and design , 1988 .

[10]  Ben Y. Zhao,et al.  An architecture for a secure service discovery service , 1999, MobiCom.

[11]  Ian H. Witten,et al.  DEVELOPER'S GUIDE , 2001 .

[12]  Bill Serra,et al.  People, Places, Things: Web Presence for the Real World , 2002, Mob. Networks Appl..

[13]  Li Gong Java Security Architecture (JDK1.2) , 1997 .

[14]  Roger Kehr,et al.  A Jini-based Gateway Architecture for Mobile Devices , 1999, Java-Informations-Tage.