SPARTA: a Secure, Policy-Driven Architecture for Content Distribution and Storage in Centralized Wireless Networks

نویسندگان

  • Wassim Itani
  • Ayman Kayssi
  • Ali Chehab
چکیده

This paper presents SPARTA (Secure, Policy-driven, ARchitecture for content disTribution and storAge), a secure, policy-driven architecture for enterprise applications operating in centralized wireless environments. SPARTA supports end-to-end client authentication, data integrity and confidentiality. The security services provided by SPARTA are customized and controlled by easily configurable security policies which specify several security-related attributes, classify network and locally-stored data based on sensitivity and content, and provide an abstraction for the communication and messaging between the client and the server. In addition, SPARTA provides a standard Application Programming Interface (API) that conceals to a great extent the complexity of security operations and programming from the application. SPARTA was designed in a platform-neutral manner and can be implemented on a wide range of wireless clients ranging from low-end platforms such as the Java 2 Mobile Edition/Connected Limited Device Configuration (J2ME/CLDC) on limited-memory mobile devices to Personal Java and the .Net Compact Framework on PDAs. On the server side, SPARTA can be implemented on any of the available enterprise server platforms. A sample implementation of SPARTA was developed for J2ME on the client-side and Java 2 Enterprise Edition (J2EE) on the serverside.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient solution for management of pre-distribution in wireless sensor networks

A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...

متن کامل

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design

Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...

متن کامل

Asymptotic Close to Optimal Resource Allocation in Centralized Multi-band Wireless Networks

This paper concerns sub-channel allocation in multi-user wireless networks with a view to increasing the network throughput. It is assumed there are some sub-channels to be equally divided among active links, such that the total sum rate increases, where it is assumed each link is subject to a maximum transmit power constraint. This problem is found to be a non-convex optimization problem and i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005