Back to Results
First PageMeta Content
Jini / Cryptographic protocols / Internet protocols / Internet standards / Java remote method invocation / Transport Layer Security / Enterprise JavaBeans / Proxy server / Reverse proxy / Computing / Beta software / Java platform


Decentralized Jini Security Pasi Eronen and Pekka Nikander Helsinki University of Technology {pasi.eronen, pekka.nikander}@hut.fi Abstract
Add to Reading List

Document Date: 2001-07-20 00:16:52


Open Document

File Size: 74,84 KB

Share Result on Facebook

City

Oakland / /

Company

Traditionally / Red Hat / Jini / /

/

Event

FDA Phase / /

Facility

Pekka Nikander Helsinki University of Technology / /

IndustryTerm

security server / security infrastructure / directory access protocol / word processor / authentication protocol / ad hoc networking situation / coupled systems / ad hoc mobile networks / actual solution / client software / service software / security solution / inadequate solutions / pure ad hoc network / running multiple services / large networks / appropriate solutions / e.g. mobile ad hoc networks / printer services / wire protocol / distributed computing / communication protocol / decentralized security solution / proper certificate chain / identity-based publickey systems / trust management systems / transport protocol / unsatisfactory solution / long chain / ad hoc network / term trust management / trust management / service location protocols / spontaneous networking / legacy devices / secure lookup server / ad hoc networks / demonstration solution / distributed computing attempt / proposed solutions / certificate chain / short range radio network / security services / fixed communications protocol / corporate network / faulttolerant applications / on-line security server / web server / genuine ad hoc network / computing / client applications / decentralized solutions / cleaner solution / software architecture / trusted applications / security solutions / building more faulttolerant applications / /

OperatingSystem

Red Hat Linux / /

Organization

Helsinki University of Technology / Java Authentication and Authorization Service / Authorization Service / /

Person

Johannes Lehtinen / Ann Wollrath / Yi Deng / Dirk Balfanz / Jukka Zitting / Satu Virtanen / Geoffrey Clements / Petra Pietiläinen / Antti Mannisto / Robert W. Scheifler / Carol Burt / Jim Waldo / Ken Arnold / Bob Blakley / Konstantin Beznosov / Figure / Mike Spreitzer / John Barkley / Jonna Särs / /

/

Position

lazy service writer / security manager / Jini security manager / word processor / administrator / marshall / /

Product

Java Security Socket Extension / Sun / Linux / Jini / Our solution / /

ProgrammingLanguage

Java / /

ProvinceOrState

Manitoba / California / /

Technology

virtual machine / authentication protocol / RAM / Fixed protocol / modified protocol / Jini technology / Linux / private key / CORBA / secret key / directory access protocol / operating system / access control list / cryptography / security Protocol / Enterprise JavaBeans / public key / DNS / Java / transport protocol / communication protocol / specific communication protocol / RMI wire protocol / fixed communications protocol / authority key JAR signature Proxy key Authentication protocol / PDA / word processor / service location protocols / Bluetooth / web server / /

SocialTag