DocumentCode
2584633
Title
SPECSA: a scalable, policy-driven, extensible, and customizable security architecture for wireless enterprise applications
Author
Itani, Wassim ; Kayssi, Ayman I.
Author_Institution
Dept. of Electr. & Comput. Eng., American Univ. of Beirut, Lebanon
fYear
2004
fDate
2004
Firstpage
753
Lastpage
759
Abstract
This paper presents SPECSA, a new, optimized, policy-driven security architecture for wireless enterprise applications. SPECSA is scalable, extensible, flexible, and customizable. It supports end-to-end client authentication, data integrity and confidentiality between wireless clients and enterprise servers. The security services provided by SPECSA are customized and controlled by an easily configurable security policy that specifies several security-related attributes, classifies network data based on sensitivity and content, and provides an abstraction for the communication and messaging between the client and the server. In addition, SPECSA provides an application programming interface (API) that conceals to a great extent the complexity of security operations and programming from the application. SPECSA was designed in a platform-neutral manner and can be implemented on a wide range of wireless clients ranging from low-end platforms such as the Java 2 mobile edition/connected limited device configuration (J2ME/CLDC) on limited-memory mobile devices to Personal Java and the .Net compact framework on PDAs. On the server side, SPECSA can be implemented on any of the available enterprise server platforms. A sample implementation of SPECSA was developed for J2ME on the client-side and Java 2 enterprise edition (J2EE) on the server-side.
Keywords
Java; application program interfaces; client-server systems; data integrity; electronic commerce; mobile radio; notebook computers; telecommunication security; .Net compact framework; J2ME; Java 2 enterprise edition; Java 2 mobile edition; PDA; SPECSA; application programming interface; connected limited device configuration; data integrity; end-to-end client authentication; enterprise servers; personal Java; platform-neutral manner; policy-driven security architecture; wireless clients; wireless enterprise applications; Authentication; Communication system control; Communication system security; Cryptography; Data security; Delay; Java; Network servers; Wireless application protocol; Wireless sensor networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Performance, Computing, and Communications, 2004 IEEE International Conference on
Print_ISBN
0-7803-8396-6
Type
conf
DOI
10.1109/PCCC.2004.1395173
Filename
1395173
Link To Document