Security Enhancements for a User-Controlled Lightpath Provisioning System

被引:0
|
作者
Wu, Jing [1 ]
Savoie, Michel [1 ]
Zhang, Hanxi [1 ]
Campbell, Scott [1 ]
机构
[1] Commun Res Ctr, 3701 Carling Ave, Ottawa, ON K2H 8S2, Canada
关键词
Network Management Software; Distributed Software Security; User-Controlled Lightpath Provisioning;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
User owned and managed optical networks offer new benefits compared to carrier networks. There are basically two types of user owned and managed optical networks: metro dark fibre networks and long-haul wavelength networks. A user-controlled lightpath provisioning system is designed to address the network management challenges, where only the customer has complete visibility of its own network and no provider can see all the network elements. The prototyped management software has a service-oriented architecture and uses the Jini and JavaSpaces technologies. Within one management system for a federation, there are six key components: a Jini Lookup Service, an instance of JavaSpaces; for storage of Light Path Objects (LPOs), a Jini Service Access Point (SAP), an LPO service, an instance of switch communication service for each switch in the transport layer and a Grid SAP. Since the new management system is a distributed system and the new management system may be deployed over a public Internet infrastructure, secure access to the management modules is required. The application of existing system security technologies to the new management system is analyzed. To securely transfer objects across a network, SSL is used to encrypt RMI data streams and thus data streams between Jini services. To securely execute a dynamically downloaded Java class, Jini adopts the Java security model. To securely use a dynamically downloaded proxy to communicate to a remote service, Jini Extensible Remote Invocation is implemented to support security features such as invocation constraints, remote method control, and the trust verification model.
引用
收藏
页码:634 / +
页数:2
相关论文
共 50 条
  • [41] User-controlled federated matrix factorization for recommender systems
    Anelli, Vito Walter
    Deldjoo, Yashar
    Di Noia, Tommaso
    Ferrara, Antonio
    Narducci, Fedelucio
    JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2022, 58 (02) : 287 - 309
  • [42] A user-controlled priority selection strategy for multiplayer games
    Carrig, Brian
    Denieffe, David
    Murphy, John
    2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2007, : 353 - +
  • [43] Visual analytics approach to user-controlled evacuation scheduling
    Andrienko, Gennady
    Andrienko, Natalia
    Bartling, Ulrich
    INFORMATION VISUALIZATION, 2008, 7 (01) : 89 - 103
  • [44] Extending user-controlled security domain with TPM/TCG in Grid-based virtual collaborative environment
    Demchenko, Yuri
    Gommans, Leon
    de Laat, Cees
    CTS 2007: PROCEEDINGS OF THE 2007 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS, 2007, : 57 - 65
  • [45] User-controlled federated matrix factorization for recommender systems
    Vito Walter Anelli
    Yashar Deldjoo
    Tommaso Di Noia
    Antonio Ferrara
    Fedelucio Narducci
    Journal of Intelligent Information Systems, 2022, 58 : 287 - 309
  • [46] User-controlled collaborations in the context of trust extended environments
    Chan, Jonathan
    Nepal, Surya
    Moreland, David
    Hwang, Hon
    Chen, Shiping
    Zic, John
    WET ICE 2007: 16TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2007, : 389 - 394
  • [47] A Language and Preprocessor for User-Controlled Generation of Synthetic Programs
    Chiu, Alton
    Garvey, Joseph
    Abdelrahman, Tarek S.
    SCIENTIFIC PROGRAMMING, 2017, 2017
  • [48] Unleashing the Disruptive Potential of User-Controlled Identity Management
    Minerva, Roberto
    Crespi, Noel
    2011 TECHNICAL SYMPOSIUM AT ITU TELECOM WORLD (ITU WT), 2011, : 1 - 6
  • [49] Visual analytics approach to user-controlled evacuation scheduling
    Andrienko, Gennady
    Andrienko, Natalia
    Bartling, Ulrich
    VAST: IEEE SYMPOSIUM ON VISUAL ANALYTICS SCIENCE AND TECHNOLOGY 2007, PROCEEDINGS, 2007, : 43 - 50
  • [50] Attribute-Based Signatures with User-Controlled Linkability
    El Kaafarani, Ali
    Chen, Liqun
    Ghadafi, Essam
    Davenport, James
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 256 - +