13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

170 H.-P. Bischof, A. Kam<strong>in</strong>sky, and J. B<strong>in</strong>derquest<strong>in</strong>g client pr<strong>in</strong>t<strong>in</strong>g application, not to any other pr<strong>in</strong>t clients that may be present.After execut<strong>in</strong>g all the report <strong>in</strong>vocations, the pr<strong>in</strong>t<strong>in</strong>g application knows the name ofeach available pr<strong>in</strong>ter and has a unihandle for submitt<strong>in</strong>g jobs to each pr<strong>in</strong>ter.F<strong>in</strong>ally, after ask<strong>in</strong>g the user to select one of the pr<strong>in</strong>ters, the application calls:c_Pr<strong>in</strong>ter.pr<strong>in</strong>t(theDocument);where c_Pr<strong>in</strong>ter is the selected pr<strong>in</strong>ter's unihandle as previously passed to thereport method. S<strong>in</strong>ce it is <strong>in</strong>voked on a unihandle, this call goes just to the selectedpr<strong>in</strong>ter, not the other pr<strong>in</strong>ters. The pr<strong>in</strong>ter proceeds to pr<strong>in</strong>t the document passed tothe pr<strong>in</strong>t method.Clearly, this <strong>in</strong>vocation pattern of broadcast discovery request - discovery responses- service usage can apply to any service, not just pr<strong>in</strong>t<strong>in</strong>g. It is even possibleto def<strong>in</strong>e a generic service discovery <strong>in</strong>terface that can be used to f<strong>in</strong>d objects thatimplement any <strong>in</strong>terface, the desired <strong>in</strong>terface be<strong>in</strong>g specified as a parameter of thediscovery method <strong>in</strong>vocation.M2MI ArchitectureOur <strong>in</strong>itial work with M2MI has focused on networked collaborative systems. In thisenvironment of ad hoc networks of proximal mobile wireless devices, M2MI is layeredon top of a new network protocol, M2MP. We have implemented <strong>in</strong>itial versionsof M2MP and M2MI <strong>in</strong> Java. Are detailed description of the design and architecturecan be found at [4].M2MI SecurityProvid<strong>in</strong>g security with<strong>in</strong> M2MI-based systems is an area of current development.We have identified these general security requirements:• Confidentiality - Intruders who are not part of a collaborative system must not beable to understand the contents of the M2MI <strong>in</strong>vocations.• Participant authentication - Intruders who are not authorized to participate <strong>in</strong> acollaborative system must not be able to perform M2MI <strong>in</strong>vocations <strong>in</strong> that system.• Service authentication - Intruders must not be able to masquerade as legitimateparticipants <strong>in</strong> a collaborative system and accept M2MI <strong>in</strong>vocations. For example,a client must be assured that a service claim<strong>in</strong>g to be a certa<strong>in</strong> pr<strong>in</strong>ter really is thepr<strong>in</strong>ter that is go<strong>in</strong>g to pr<strong>in</strong>t the client's job and not some <strong>in</strong>truder.While exist<strong>in</strong>g techniques for achiev<strong>in</strong>g confidentiality and authentication work well<strong>in</strong> an environment of fixed hosts, wired networks, these techniques will not work well<strong>in</strong> an environment of mobile devices, wireless networks, and no central servers.A decentralized key management is necessary n order to achieve the security requirements.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!