Secure Connection

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 12507 Experts worldwide ranked by ideXlab platform

Ashley Moye - One of the best experts on this subject based on the ideXlab platform.

Chengzhong Xu - One of the best experts on this subject based on the ideXlab platform.

  • a reliable Connection migration mechanism for synchronous transient communication in mobile codes
    International Conference on Parallel Processing, 2004
    Co-Authors: Xiliang Zhong, Chengzhong Xu
    Abstract:

    With the increasing popularity of network applications, mobile codes become a promising technology to provide scalable services. Due to their mobile nature, it is a challenge to support synchronous transient communication between mobile objects. This work presents a reliable Connection migration mechanism that allows mobile objects in communication to remain connected during their migration. This mechanism supports concurrent migration of both end-points of a Connection and guarantees exactly-once delivery of all transmitted data. In addition, a mobile code access control model is integrated to ensure Secure Connection migration. This work presents the design of the mechanism and a reference implementation, namely NapletSocket, over Java Socket in a mobile agent system. Experimental results show that NapletSocket incurs a moderate cost in Connection setup, mainly due to security checking, and marginal overhead for communication over established Connections. Furthermore, we investigate the impact of agent mobility on communication performance via simulation. Simulation results show that NapletSocket is efficient for a wide range of migration and communication patterns.

  • ICPP - A reliable Connection migration mechanism for synchronous transient communication in mobile codes
    2004
    Co-Authors: Xiliang Zhong, Chengzhong Xu
    Abstract:

    With the increasing popularity of network applications, mobile codes become a promising technology to provide scalable services. Due to their mobile nature, it is a challenge to support synchronous transient communication between mobile objects. This work presents a reliable Connection migration mechanism that allows mobile objects in communication to remain connected during their migration. This mechanism supports concurrent migration of both end-points of a Connection and guarantees exactly-once delivery of all transmitted data. In addition, a mobile code access control model is integrated to ensure Secure Connection migration. This work presents the design of the mechanism and a reference implementation, namely NapletSocket, over Java Socket in a mobile agent system. Experimental results show that NapletSocket incurs a moderate cost in Connection setup, mainly due to security checking, and marginal overhead for communication over established Connections. Furthermore, we investigate the impact of agent mobility on communication performance via simulation. Simulation results show that NapletSocket is efficient for a wide range of migration and communication patterns.

  • a reliable and Secure Connection migration mechanism for mobile agents
    International Conference on Distributed Computing Systems Workshops, 2004
    Co-Authors: Xiliang Zhong, Chengzhong Xu, Haiying Shen
    Abstract:

    Connection migration in mobile systems is to support continuous and transparent communication operations between mobile agents. We present a reliable Connection migration mechanism that provides exactly-once delivery for all transmitted data during agent migration. It integrates with an agent-based access control mechanism that controls the access to network ports. To avoid frequent agent authentication and permission checking due to agent migration, a secret session key is associated with each Connection. We present the design and implementation of the mechanism, named NapletSocket in Naplet mobile agent system. It is a pure middleware implementation, requiring no modification of Java virtual machines. Evaluation results show that the NapletSocket system incurs a moderate overhead in Connection setup, mainly due to security checking. Once a Secure Connection is established, only a marginal cost is needed to pay for reliable communication during agent migration.

Eduardo B Fernandez - One of the best experts on this subject based on the ideXlab platform.

  • cipher suite rollback a misuse pattern for the ssl tls client server authentication handshake protocol
    PLoP '14 Proceedings of the 21st Conference on Pattern Languages of Programs, 2014
    Co-Authors: Ali Alkazimi, Eduardo B Fernandez
    Abstract:

    Transport Layer Security (TLS) is a cryptographic protocol that provides a Secure channel between a client and a server. TLS is the successor to the Secure Sockets Layer (SSL) protocol. The Secure Connection prevents an attacker from eavesdropping an established client-server Connection. It is used in most internet communications for enabling Secure web browsing. The SSL/TLS security protocol is layered between the application protocol layer and the TCP/IP layer and includes as one of its sub-protocols the Handshake Protocol. We present here a misuse pattern for the SSL/TLS Handshake Protocol: the Cipher Suite Rollback, where the attacker intercepts the "ClientHello" message, replaces the CipherSuite (a list of encryption algorithms), with a weak or NULL-Cipher, and passes the intercepted message to the server which will now use a weaker cipher, allowing the attacker to gain access to the exchanged data between the client and the server.

  • Cipher suite rollback: a misuse pattern for the SSL/TLS client/server authentication handshake protocol
    2014
    Co-Authors: Ali Alkazimi, Eduardo B Fernandez
    Abstract:

    Transport Layer Security (TLS) is a cryptographic protocol that provides a Secure channel between a client and a server. TLS is the successor to the Secure Sockets Layer (SSL) protocol. The Secure Connection prevents an attacker from eavesdropping an established client-server Connection. It is used in most internet communications for enabling Secure web browsing. The SSL/TLS security protocol is layered between the application protocol layer and the TCP/IP layer and includes as one of its sub-protocols the Handshake Protocol. We present here a misuse pattern for the SSL/TLS Handshake Protocol: the Cipher Suite Rollback, where the attacker intercepts the "ClientHello" message, replaces the CipherSuite (a list of encryption algorithms), with a weak or NULL-Cipher, and passes the intercepted message to the server which will now use a weaker cipher, allowing the attacker to gain access to the exchanged data between the client and the server.

Xiliang Zhong - One of the best experts on this subject based on the ideXlab platform.

  • a reliable Connection migration mechanism for synchronous transient communication in mobile codes
    International Conference on Parallel Processing, 2004
    Co-Authors: Xiliang Zhong, Chengzhong Xu
    Abstract:

    With the increasing popularity of network applications, mobile codes become a promising technology to provide scalable services. Due to their mobile nature, it is a challenge to support synchronous transient communication between mobile objects. This work presents a reliable Connection migration mechanism that allows mobile objects in communication to remain connected during their migration. This mechanism supports concurrent migration of both end-points of a Connection and guarantees exactly-once delivery of all transmitted data. In addition, a mobile code access control model is integrated to ensure Secure Connection migration. This work presents the design of the mechanism and a reference implementation, namely NapletSocket, over Java Socket in a mobile agent system. Experimental results show that NapletSocket incurs a moderate cost in Connection setup, mainly due to security checking, and marginal overhead for communication over established Connections. Furthermore, we investigate the impact of agent mobility on communication performance via simulation. Simulation results show that NapletSocket is efficient for a wide range of migration and communication patterns.

  • ICPP - A reliable Connection migration mechanism for synchronous transient communication in mobile codes
    2004
    Co-Authors: Xiliang Zhong, Chengzhong Xu
    Abstract:

    With the increasing popularity of network applications, mobile codes become a promising technology to provide scalable services. Due to their mobile nature, it is a challenge to support synchronous transient communication between mobile objects. This work presents a reliable Connection migration mechanism that allows mobile objects in communication to remain connected during their migration. This mechanism supports concurrent migration of both end-points of a Connection and guarantees exactly-once delivery of all transmitted data. In addition, a mobile code access control model is integrated to ensure Secure Connection migration. This work presents the design of the mechanism and a reference implementation, namely NapletSocket, over Java Socket in a mobile agent system. Experimental results show that NapletSocket incurs a moderate cost in Connection setup, mainly due to security checking, and marginal overhead for communication over established Connections. Furthermore, we investigate the impact of agent mobility on communication performance via simulation. Simulation results show that NapletSocket is efficient for a wide range of migration and communication patterns.

  • a reliable and Secure Connection migration mechanism for mobile agents
    International Conference on Distributed Computing Systems Workshops, 2004
    Co-Authors: Xiliang Zhong, Chengzhong Xu, Haiying Shen
    Abstract:

    Connection migration in mobile systems is to support continuous and transparent communication operations between mobile agents. We present a reliable Connection migration mechanism that provides exactly-once delivery for all transmitted data during agent migration. It integrates with an agent-based access control mechanism that controls the access to network ports. To avoid frequent agent authentication and permission checking due to agent migration, a secret session key is associated with each Connection. We present the design and implementation of the mechanism, named NapletSocket in Naplet mobile agent system. It is a pure middleware implementation, requiring no modification of Java virtual machines. Evaluation results show that the NapletSocket system incurs a moderate overhead in Connection setup, mainly due to security checking. Once a Secure Connection is established, only a marginal cost is needed to pay for reliable communication during agent migration.

  • ICDCS Workshops - A reliable and Secure Connection migration mechanism for mobile agents
    24th International Conference on Distributed Computing Systems Workshops 2004. Proceedings., 2004
    Co-Authors: Xiliang Zhong, Haiying Shen
    Abstract:

    Connection migration in mobile systems is to support continuous and transparent communication operations between mobile agents. We present a reliable Connection migration mechanism that provides exactly-once delivery for all transmitted data during agent migration. It integrates with an agent-based access control mechanism that controls the access to network ports. To avoid frequent agent authentication and permission checking due to agent migration, a secret session key is associated with each Connection. We present the design and implementation of the mechanism, named NapletSocket in Naplet mobile agent system. It is a pure middleware implementation, requiring no modification of Java virtual machines. Evaluation results show that the NapletSocket system incurs a moderate overhead in Connection setup, mainly due to security checking. Once a Secure Connection is established, only a marginal cost is needed to pay for reliable communication during agent migration.

M. Ohta - One of the best experts on this subject based on the ideXlab platform.

  • MIS Protocol for Secure Connection and Fast Handover on Wireless LAN
    20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06), 2006
    Co-Authors: H. Morioka, H. Mano, M. Ohrnori, M. Ohta
    Abstract:

    MIS (mobile Internet services) architecture is designed for Secure Connection and fast handover with wireless LAN. This architecture consists of three protocols, MISP (mobile Internet services protocol), MISAUTHP (mobile Internet services authentication protocol) and MIS MobilelP, and two kinds of servers, authentication servers and home agent, base routers and mobile nodes. MISP is a protocol designed for authentication, IP address assignments, session key exchanges and various negotiations between mobile nodes and base routers with one-round-trip packet exchange after a mobile node receives beacons. MISP quickly establishes link between mobile nodes and base routers. MISAUTHP is a protocol for authentication between authentication servers and base routers. MISAUTHP can authenticate mobile nodes and base routers with single exchange of packets too, MIS MobilelP is a mobility support protocol for IPv4. This is a subset of RFC2002 MobileIP. We mainly describe about MISP, MISAUTHP and comparison between MISP with MISAUTHP and IEEE802.11 with IEEE802.1x

  • AINA (1) - MIS Protocol for Secure Connection and Fast Handover on Wireless LAN
    20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06), 2006
    Co-Authors: H. Morioka, H. Mano, M. Ohrnori, M. Ohta
    Abstract:

    MIS (mobile Internet services) architecture is designed for Secure Connection and fast handover with wireless LAN. This architecture consists of three protocols, MISP (mobile Internet services protocol), MISAUTHP (mobile Internet services authentication protocol) and MIS MobilelP, and two kinds of servers, authentication servers and home agent, base routers and mobile nodes. MISP is a protocol designed for authentication, IP address assignments, session key exchanges and various negotiations between mobile nodes and base routers with one-round-trip packet exchange after a mobile node receives beacons. MISP quickly establishes link between mobile nodes and base routers. MISAUTHP is a protocol for authentication between authentication servers and base routers. MISAUTHP can authenticate mobile nodes and base routers with single exchange of packets too, MIS MobilelP is a mobility support protocol for IPv4. This is a subset of RFC2002 MobileIP. We mainly describe about MISP, MISAUTHP and comparison between MISP with MISAUTHP and IEEE802.11 with IEEE802.1x