Abstract
In the ubiquitous computing environment new service components should be able to connect to networks at any time, and clients also should be able to use them immediately even without extra settings. Jini is one of the widely used middlewares today. Although event management is an essential component of ubiquitous middlewares, Jini is distributed without event management service. Accordingly, we design and implement the event manager based on Jini and suggest three methods in which only right event consumer can listen to the event using Access-Control Lists and SPKI/SDSI certificates. In the proposed method, our event manager controls the access of events by putting trust checking engine on Jini.
This research was supported by the MIC (Ministry of Information and Communication), Korea, under the ITRC (Information Technology Research Center) support program supervised by the IITA (Institute of Information Technology Assessment).
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Román, M., Hess, C.K., Cerqueira, R., Ranganathan, A., Campbell, R.H., Nahrstedt, K.: Gaia: A Middleware Infrastructure to Enable Active Spaces. In: IEEE Pervasive Computing, pp. 74–83 (October-December 2002)
Rakotonirainy, A., Indulska, J., Loke, W.W., Zaslavsky, A.: Middleware for reactive components: An integrated use of context, roles, and event based coordination. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, pp. 77–98. Springer, Heidelberg (2001)
Sousa, J.P., Garlan, D.: Aura:an architectural framework for user mobility in ubiquitous computing environments. In: Proceedings of the 3rd Working IEEE/IFIP Conference on Software Architecture, Montreal, Canada (August 2000)
Borthakur, B.: Distributed and Persistend Event System For Active Spaces. In: Master Thesis in Computer Science, Urbana-Champaign: University of Illinois at Urbana-Champaign (2002)
Bishop, P., Warren, N.: JavaSpaces IN PRACTICE. Addison-Wesley, Reading (2003)
Maywah, A.J.: An Implementation of a Secure Web Clent Using SPKI/SDSI Certificates. Master of thesis, MIT, EECS (May 2000)
Ellison, C.M., Frantz, B., Lampson, B., Rivest, R., Thomas, B.M., Ylonen, T.: SPKI Certificate Theory. RFC2693 (September 1999)
Clarke, D., Elien, J.-E., Ellison, C., Fredette, M., Morcos, A., Rivest, R.L.: Certificate Chain Discovery in SPKI/SDSI. Journal of Computer Security 9(4), 285–322 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, Y., Lee, H., Lee, S., Park, H., Noh, B. (2005). The Design and Implementation of Secure Event Manager Using SPKI/SDSI Certificate. In: Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y., Yang, L.T. (eds) Embedded and Ubiquitous Computing – EUC 2005 Workshops. EUC 2005. Lecture Notes in Computer Science, vol 3823. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596042_51
Download citation
DOI: https://doi.org/10.1007/11596042_51
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30803-4
Online ISBN: 978-3-540-32296-2
eBook Packages: Computer ScienceComputer Science (R0)