13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

170 H.-P. Bischof, A. Kam<strong>in</strong>sky, and J. B<strong>in</strong>derquest<strong>in</strong>g client pr<strong>in</strong>t<strong>in</strong>g application, not to any other pr<strong>in</strong>t clients that may be present.After execut<strong>in</strong>g all the report <strong>in</strong>vocations, the pr<strong>in</strong>t<strong>in</strong>g application knows the name ofeach available pr<strong>in</strong>ter and has a unihandle for submitt<strong>in</strong>g jobs to each pr<strong>in</strong>ter.F<strong>in</strong>ally, after ask<strong>in</strong>g the user to select one of the pr<strong>in</strong>ters, the application calls:c_Pr<strong>in</strong>ter.pr<strong>in</strong>t(theDocument);where c_Pr<strong>in</strong>ter is the selected pr<strong>in</strong>ter's unihandle as previously passed to thereport method. S<strong>in</strong>ce it is <strong>in</strong>voked on a unihandle, this call goes just to the selectedpr<strong>in</strong>ter, not the other pr<strong>in</strong>ters. The pr<strong>in</strong>ter proceeds to pr<strong>in</strong>t the document passed tothe pr<strong>in</strong>t method.Clearly, this <strong>in</strong>vocation pattern of broadcast discovery request - discovery responses- service usage can apply to any service, not just pr<strong>in</strong>t<strong>in</strong>g. It is even possibleto def<strong>in</strong>e a generic service discovery <strong>in</strong>terface that can be used to f<strong>in</strong>d objects thatimplement any <strong>in</strong>terface, the desired <strong>in</strong>terface be<strong>in</strong>g specified as a parameter of thediscovery method <strong>in</strong>vocation.M2MI ArchitectureOur <strong>in</strong>itial work with M2MI has focused on networked collaborative systems. In thisenvironment of ad hoc networks of proximal mobile wireless devices, M2MI is layeredon top of a new network protocol, M2MP. We have implemented <strong>in</strong>itial versionsof M2MP and M2MI <strong>in</strong> Java. Are detailed description of the design and architecturecan be found at [4].M2MI SecurityProvid<strong>in</strong>g security with<strong>in</strong> M2MI-based systems is an area of current development.We have identified these general security requirements:• Confidentiality - Intruders who are not part of a collaborative system must not beable to understand the contents of the M2MI <strong>in</strong>vocations.• Participant authentication - Intruders who are not authorized to participate <strong>in</strong> acollaborative system must not be able to perform M2MI <strong>in</strong>vocations <strong>in</strong> that system.• Service authentication - Intruders must not be able to masquerade as legitimateparticipants <strong>in</strong> a collaborative system and accept M2MI <strong>in</strong>vocations. For example,a client must be assured that a service claim<strong>in</strong>g to be a certa<strong>in</strong> pr<strong>in</strong>ter really is thepr<strong>in</strong>ter that is go<strong>in</strong>g to pr<strong>in</strong>t the client's job and not some <strong>in</strong>truder.While exist<strong>in</strong>g techniques for achiev<strong>in</strong>g confidentiality and authentication work well<strong>in</strong> an environment of fixed hosts, wired networks, these techniques will not work well<strong>in</strong> an environment of mobile devices, wireless networks, and no central servers.A decentralized key management is necessary n order to achieve the security requirements.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!