Filters








78 Hits in 3.5 sec

Split Message-Based Anonymity for JXTA Applications

Joan Arnedo-Moreno, Noemi Perez-Gilabert
2012 2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems  
In this work, we propose an anonymity service for JXTA using such approach.  ...  Even though path-based approaches are quite popular, it is considered that, in dynamic groups, using a split message-based one is better.  ...  SPLIT-MESSAGE BASED ANONYMITY SERVICE JXTA main purpose is providing mechanisms to share resources and services.  ... 
doi:10.1109/cisis.2012.14 dblp:conf/cisis/Arnedo-MorenoP12 fatcat:6c3uc4a3zngknakyzviwccbkx4

Anonymous communications for JXTA peer-to-peer services: A multi-protocol approach

Joan Arnedo-Moreno
2013 IN3 Working Paper Series  
In this paper, we study the feasibility of anonymous communications in JXTA by proposing an anonymity service that relies on a multi-protocol approach.  ...  As far as the end client is concerned, JXTA has acted just like during any standard service access. The anonymity layer was invisible to it.  ...  In this work, we used the proposed protocol adaptation to compare the unimessage (onion routing) and split-message (rumor riding) based approaches on an even field: the JXTA middleware.  ... 
doi:10.7238/in3wps.v0i0.1650 fatcat:yrl3msip2fe6hn2syoxntumaom

An Anonymity Layer for JXTA Services

Joan Arnedo-Moreno, Marc Domingo-Prieto
2011 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications  
In this work, we propose how to adapt JXTA messaging so that services may be anonymously accessed, by taking advantage of JXTA's idiosyncracies and capabilities, in a manner that is completely invisible  ...  JXTA is a set of open protocols that enable the creation and deployment of peer-to-peer (P2P) networks, allowing the execution of services in a distributed manner.  ...  that must be forwarded.  ... 
doi:10.1109/waina.2011.9 dblp:conf/aina/Arnedo-MorenoD11 fatcat:nh65yia7uvgopajgjxu6xr4o4e

JXTAnonym: An Anonymity Layer for JXTA Services Messaging

Marc DOMINGO-PRIETO, Joan ARNEDO-MORENO
2012 IEICE transactions on information and systems  
This work studies how to provide anonymity to JXTA's architecture in a feasible manner and proposes an extension which allows deployed services to process two-way messaging without disclosing the endpoints  ...  The JXTA open protocols specification is a good example of this kind of scenario.  ...  JXTAnonym provides consumer and provider anonymity in any JXTA service access.  ... 
doi:10.1587/transinf.e95.d.169 fatcat:kw4cxdmgovdp7pyzsfema6tja4

Experimental Evaluation of Anonymous Protocols under the JXTA Middlewar

Joan Arnedo-Moreno, Noemi Perez-Gilabert, Marc Domingo-Prieto
2012 2012 15th International Conference on Network-Based Information Systems  
In this paper, we provide an experimental evaluation of two relevant protocols, each one belonging to a different category of approaches to anonymity: unimessage and split message.  ...  services.  ...  protocol implementations adapted to JXTA service access.  ... 
doi:10.1109/nbis.2012.28 dblp:conf/nbis/Arnedo-MorenoPD12 fatcat:p57m454q2ncvdmdgmx2fph7rhi

Publishing and Discovery of Mobile Web Services in Peer to Peer Networks [article]

Satish Narayana Srirama
2010 arXiv   pre-print
It is now feasible to host Web Services on a mobile device due to the advances in cellular devices and mobile communication technologies.  ...  P2P also enhances the service discovery of huge number of Web Services possible with Mobile Hosts.  ...  Acknowledgement The work is supported by German Research Foundation (DFG) as part of the Graduate School "Software for Mobile Communication Systems" at RWTH Aachen University.  ... 
arXiv:1007.2980v1 fatcat:sbq4xkev3fewjm6prksvhh7ffm

Peer-to-peer information systems

Karl Aberer, Manfred Hauswirth
2001 Proceedings of the 8th European software engineering conference held jointly with 9th ACM SIGSOFT international symposium on Foundations of software engineering - ESEC/FSE-9  
community services Sun JXTA services •Indexing •Searching •File sharing Security Peer groups Peer pipes Peer monitoring Any peer on the extended Web JXTA applications JXTA services  ...  • Goal: a uniform platform for applications using P2P technology a nd for various P2P systems to interact JXTA community applications Peer shell Peer commands Sun JXTA applications JXTA  ... 
doi:10.1145/503209.503268 dblp:conf/sigsoft/AbererH01 fatcat:sxk6svl42bfennxnvspkmjsc4m

Mobile hosts in enterprise service integration

Satish Narayana Srirama, Matthias Jarke
2009 International Journal of Web Engineering and Technology  
When JXTA-SOAP is used, the SOAP request/response messages are put in JXTA messages and sent through JXTA pipes, rather than put in HTTP messages and sent over TCP/IP.  ...  For achieving the invocation of services in JXTA, the study proposes a port forwarding model.  ... 
doi:10.1504/ijwet.2009.028620 fatcat:ho2y475htrhv7hq4cjmd6cgqbi

Peer to Peer Networks Management Survey [article]

Mourad Amad, Ahmed Meddahi, Djamil Aïssani
2012 arXiv   pre-print
Locating a resource or service efficiently is one of the most important issues related to peer-to-peer networks.  ...  JXTA defines a series of protocols, and XML message formats, for communication between peers [23] .  ...  as the query messages are forwarded.  ... 
arXiv:1203.3351v1 fatcat:rn2p72niznav3ox3mtzqecze4i

A Survey of Peer- to -Peer Overlay Schemes: Effectiveness, Efficiency and Security

Michele Amoretti
2010 Recent Patents on Computer Science  
This dynamical behavior of the peers frequently partitions the network into smaller fragments which results in the breakdown of communication among peers.  ...  In distributed computing, the peer-to-peer paradigm enables two or more entities to collaborate spontaneously in an overlay network of equals (peers) by using appropriate information and communication  ...  Freenet uses a forwarding scheme for messages to ensure that the original requestor of a service cannot be tracked.  ... 
doi:10.2174/1874479610902030195 fatcat:aiqdocqnffdhvetgzssktiqnja

A Survey of Peer- to -Peer Overlay Schemes: Effectiveness, Efficiency and Security

Michele Amoretti
2009 Recent Patents on Computer Science  
This dynamical behavior of the peers frequently partitions the network into smaller fragments which results in the breakdown of communication among peers.  ...  In distributed computing, the peer-to-peer paradigm enables two or more entities to collaborate spontaneously in an overlay network of equals (peers) by using appropriate information and communication  ...  Freenet uses a forwarding scheme for messages to ensure that the original requestor of a service cannot be tracked.  ... 
doi:10.2174/2213275910902030195 fatcat:mcqbamtd25acnmxbem4q77c5ze

JigDFS for implementing secure container communities

Jiang Bian, Remzi Seker, Srini Ramaswamy
2009 2009 IEEE International Conference on Systems, Man and Cybernetics  
The proposed approach uses an implementation of Jigsaw Distributed File System (JigDFS) to further protect the container communities.  ...  JXTA provides a set of communication protocols and services, which construct the underlying overlay network and infrastructure for both CC-WSN and JigDFS.  ...  provided by the Rendezvous Service 3) communications between peers, provided by the Pipes and Endpoints The Distributed Hash Table ( DHT) algorithm is employed in JXTA [13] to index resources and peers  ... 
doi:10.1109/icsmc.2009.5346865 dblp:conf/smc/BianSR09 fatcat:rrnlwanpvvdrdp2is77wwy5hsm

Charging Control and Transaction Accounting Mechanisms Using IRTL (Information Resource Transaction Layer) Middleware for P2P Services [chapter]

Junseok Hwang, Praveen Aravamudham, Elizabeth Liddy, Jeffrey Stanton, Ian MacInnes
2002 Lecture Notes in Computer Science  
With the increase in the number and variety of p2p applications, there is a need to distinguish between services that can be charged and services that can operate without charging mechanisms.  ...  We propose to handle charge control, transaction accounting, reputation management and several other p2p parameters through the IRTL.  ...  If the Service Provider denies the payment amount put forward by the Requestor Peer, the service is terminated for the Requestor Peer. o In the case of Split Payment also, the Service Provider is notified  ... 
doi:10.1007/3-540-45859-x_23 fatcat:usbbos23zveffmoqoinhkszil4

Resource and service discovery in large-scale multi-domain networks

Reaz Ahmed, Noura Limam, Jin Xiao, Youssef Iraqi, Raouf Boutaba
2007 IEEE Communications Surveys and Tutorials  
Service discovery, as an essential support function of such an infrastructure, is a crucial current research challenge.  ...  With the increasing need for networked applications and distributed resource sharing, there is a strong incentive for an open large-scale service infrastructure operating over multidomain and multi-technology  ...  When the response contains a proxy-object, this one is used as a service handle to access the service through RMI. The discovery process and the access to the service are shown in Fig. 6 .  ... 
doi:10.1109/comst.2007.4444748 fatcat:shfbgcgy3bgnfem4iobvs4xdhy

MundoCore: A light-weight infrastructure for pervasive computing

Erwin Aitenbichler, Jussi Kangasharju, Max Mühlhäuser
2007 Pervasive and Mobile Computing  
MundoCore is a communication middleware specifically designed for the requirements of pervasive computing.  ...  The architectural model addresses the need for proper language bindings, different communication abstractions, peer-to-peer overlays, different transport protocols, different invocation protocols, and  ...  In addition, an interceptor callback cannot split up a single control path into multiple, e.g., to split up a message into multiple fragments.  ... 
doi:10.1016/j.pmcj.2007.04.002 fatcat:qtbim62k5bep7pbeycctxi2q2i
« Previous Showing results 1 — 15 out of 78 results