Abstract
We present a refinement design of the Authentication Framework, which is a part of a more general structure, that we refer to as Java Data Security Framework (JDSF) designed to support various aspects related to data security (confidentiality, origin authentication, integrity, SQL randomization), where this article focuses only on the authentication aspect. The design refinement considerations include unification of the parameters structure of concrete module implementations of the frameworkâs API from the software engineering point of view.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
S. Mokhov, I. Clement, S. Sinclair, and D. Nicolacopoulos, âModular Audio Recognition Framework,â Department of Computer Science and Software Engineering, Concordia University, Montreal, Canada, 2002â 2003, project report, http://marf.sf.net, last viewed April 2008.
S. A. Mokhov, âIntroducing MARF: a modular audio recognition framework and its applications for scientific and software engineering research,â in Advances in Computer and Information Sciences and Engineering. University of Bridgeport, U.S.A.: Springer Netherlands, Dec. 2007, pp. 473â478, proceedings of CISSE/SCSSâ07, cisse2007.org.
The hsqldb Development Group, âHSQLDB â lightweight 100% Java SQL database engine v.1.8.0.10,â hsqldb.org, 2001â2008, http://hsqldb.org/.
S. A. Mokhov, L. W. Huynh, J. Li, and F. Rassai, âA Java Data Security Framework (JDSF) for MARF and HSQLDB,â Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Canada, Apr. 2007, project report. Hosted at http://marf.sf.net, last viewed April 2008.
D.X. Song,D.Wagner, andA. Perrig, âPractical techniques for searches on encrypted data.â University of California, Berkley.
L.Wang, S. Jajodia, and D.Wijesekera, Preserving Privacy in On-line Analytical Processing (OLAP). Springer, Berlin, 2007, ISBN: 0â38746273-2.
L. Wang and S. Jajodia, Security in Data Warehouses and OLAP Systems in The Handbook of Database Security: Applications and Trends, M. Gertz and S. Jajodia, Eds. Springer, Berlin, 2007.
L. Sweeney, âk-anonymity: A model for protecting privacy,â in International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems, 2002, pp. 557â570.
L.Wang, âINSE691A: Database security and privacy, course notes,â CIISE, Concordia University, 2007, http://users.encs.concordia.ca/~wang/ INSE691A.html.
S. A. Mokhov, âExperimental results and statistics in the implementation of the modular audio recognition frameworkâs API for text-independent speaker Identification,â in Proceedings of the 6th International Conference on Computing, Communications and Control Technologies (CCCTâ08), C. D. Zinn, H.-W. Chu, M. Savoie, J. Ferrer, and A. Munitic, Eds., vol. II. Orlando, Florida, USA: IIIS, Jun. 2008, pp. 267â272.
ââ, âOn design and implementation of distributed modular audio recognition framework: Requirements and specification design document,â Department of Computer Science and Software Engineering, Concordia University, Montreal, Canada, Aug. 2006, project report, http://marf.sf.net, last viewed December 2008.
S. A. Mokhov and R. Jayakumar, âDistributed modular audio recognition framework (DMARF) and its applications over web services,â in Proceedings of TeNeâ08. Springer, 2008, to appear.
S. A. Mokhov, S. Sinclair, I. Clement, D. Nicolacopoulos, and the MARF Research & Development Group, âText-Independent Speaker Identification Application,â Published electronically within the MARF project, http://marf.sf.net, 2002â2008, last viewed April 2008.
S. A. Mokhov, âChoosing best algorithm combinations for speech processing tasks in machine learning using MARF,â in Proceedings of the 21st Canadian AIâ08, S. Bergler, Ed. Windsor, Ontario, Canada: Springer-Verlag, Berlin Heidelberg, May 2008, pp. 216â221, LNAI 5032.
ââ, âStudy of best algorithm combinations for speech processing tasks in machine learning using median vs. mean clusters in MARF,â in Proceedings of C3S2Eâ08, B. C. Desai, Ed. Montreal, Quebec, Canada: ACM and BytePress, May 2008, pp. 29â43, ISBN 978â1-60558â101-9.
Sun Microsystems, Inc., âOpenOffice,â [online], 2008, openoffice.org.
The PostgreSQL Global Development Group, âPostgreSQL â the worldâs most advanced open-source database,â postgresql.org, 1996â2008, http://www.postgresql.org/, last viewed May 2008.
MySQL AB and Sun Microsystems, Inc., âMySQL â the worldâs most popular open source database,â www.mysql.com, 1995â2008, http://www.mysql.com/, last viewed December 2008.
S. A. Mokhov, L.W. Huynh, J. Li, andF. Rassai, âAprivacyframework within the java data security framework (JDSF): Design refinement, implementation, and statistics,â in Proceedings of the 12th World Multi-Conference on Systemics, Cybernetics and Informatics (WM-SCIâ08), N. Callaos, W. Lesso, C. D. Zinn, J. Baralt, J. Boukachour, C. White, T. Marwala, and F. V. Nelwamondo, Eds., vol. V. Orlando, Florida, USA: IIIS, Jun. 2008, pp. 131â136.
S. A. Mokhov and L. W. Huynh, âThe integrity framework within the java data security framework (JDSF): Design refinement and implementation,â in Proceedings of CISSEâ08. University of Bridgeport, CT, USA: Springer, Dec. 2008, to appear.
S. A. Mokhov, L. Wang, and J. Li, âSimple dynamic key management in SQL randomization,â 2008, unpublished.
The GIPSY Research and Development Group, âThe General Intensional Programming System (GIPSY) project,â Department of Computer Science and Software Engineering, Concordia University, Montreal, Canada, 2002â2008, http://newton.cs.concordia.ca/~gipsy/, last viewed April 2008.
E. Mykletun, M. Narasimha, and G. Tsudik, âAuthentication and integrity in outsourced databases.â Computer Science Department, School of Information and Computer Science, University of California, Irvine, 2006.
M. Narasimha and G. Tsudik, âAuthentication of outsourced databases using signature aggregation and chaining,â 2006.
F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin, âAuthenticated index structures for aggregation queries in outsourced databases,âTech. Rep., 2006.
ââ, âDynamic authenticated index structures for outsourced databases,â in SIGMOD 2006. ACM, 2006.
DNSSEC.NET, âDNSSEC: DNS Security Extensions Securing the Domain Name System,â 2002â2008, http://www.dnssec.net/, last viewed December 2008.
D. Atkins and R. Austein, âRFC 3833: Threat Analysis of the Domain Name System (DNS),â [online], Aug. 2004, http://www.rfc-archive.org/getrfc.php?rfc=3833, viewed in December 2008.
R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose, âRFC 4034: Resource Records for the DNS Security Extensions,â [online], Mar. 2005, http://www.rfc-archive.org/getrfc.php?rfc=4034, viewed in December 2008.
D. Conrad, âRFC 3225: Indicating Resolver Support of DNSSEC,â [online], Dec. 2001, http://www.rfc-archive.org/getrfc.php?rfc=3225, viewed in December 2008.
C. Assi, INSE7120: Advanced Network Management, Course Notes. CIISE, Concordia University, 2007, http://users.encs.concordia.ca/~assi/courses/inse7120.htm.
R. Merkle, âA digital signature based on a conventional encryption function,â in Advances in Cryptology â CRYPTOâ87, 1988, pp. 369â378.
ââ, âA certified digital signature,â in Advances in Cryptology â CRYPTOâ89, 1990, pp. 218â239.
Unascribed, âCBC-DES Java implementation,â [online], 2007.
J. O. Grabbe, âJava program for RSA encryption,â [online], 2001, http://www.laynetworks.com/rsa java.txt.
Unascribed, Sign and Verify a DSA Signature. java2s.com, 2004, http://www.java2s.com/Code/Java/Security/VerifyaDSAsignature.htm.
Sun Microsystems, Inc., Security Features in Java SE. java.sun.com, 2007, http://java.sun.com/docs/books/tutorial/security/index.html.
S.Paavolainen andS. Ostermiller, MD5 hash generator. ostermiller.org, 2007, http://ostermiller.org/utils/MD5.java.html.
A. Andreu and M.-A. Laverdi`ere, âSSHA digest, modified,â [online], 2006, http://www.securitydocs.com/library/3439.
S. A. Mokhov, âTowards security hardening of scientific distributed demand-driven and pipelined computing systems,â in Proceedings of the 7th International Symposium on Parallel and Distributed Computing (ISPDCâ08). Krakow,Poland: IEEE Computer Society, Jul. 2008, pp. 375â382.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Âİ 2010 Springer Science+Business Media B.V.
About this paper
Cite this paper
Mokhov, S.A., Rassai, F., Huynh, L.W., Wang, L. (2010). The Authentication Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement. In: Sobh, T., Elleithy, K., Mahmood, A. (eds) Novel Algorithms and Techniques in Telecommunications and Networking. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3662-9_73
Download citation
DOI: https://doi.org/10.1007/978-90-481-3662-9_73
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-90-481-3661-2
Online ISBN: 978-90-481-3662-9
eBook Packages: EngineeringEngineering (R0)