• DocumentCode
    745371
  • Title

    Secure peer-to-peer networking: the JXTA example

  • Author

    Yeager, William ; Williams, Joseph

  • Author_Institution
    Planet Professional Services Group, Sun MicroSysterms Inc., Mountain View, CA, USA
  • Volume
    4
  • Issue
    2
  • fYear
    2002
  • Firstpage
    53
  • Lastpage
    57
  • Abstract
    The JXTA framework´s key benefit is its ability to provide security via well-understood, trusted approaches. Likewise, JXTA´s transport protocol independence lets applications avoid the security breaches imposed by gateways or other network infrastructure. Project JXTA has now completed J2SE and J2ME MIDP implementations.The latter is for small-footprint devices like mobile phones. A C implementation is nearly completed. These three are edge-to-edge interoperable and thus will provide JXTA P2P functionality across the device space. At JavaOne 2002, held in San Francisco during March, developers demonstrated group instant messaging among mobile phones, laptops, and desktop systems with firewall traversal, using the JXTA protocols.An open-source framework, JXTA can accommodate centralized and decentralized certificate authorities for P2P networking
  • Keywords
    computer networks; cryptography; distributed processing; protocols; security of data; J2ME; J2SE; JXTA; JXTA protocols; P2P; distributed computing; firewall traversal; peer-to-peer computing; transport protocol; Application software; Centralized control; Computer hacking; Computer networks; Distributed computing; Network servers; Open source software; Operating systems; Peer to peer computing; Videos;
  • fLanguage
    English
  • Journal_Title
    IT Professional
  • Publisher
    ieee
  • ISSN
    1520-9202
  • Type

    jour

  • DOI
    10.1109/MITP.2002.1000461
  • Filename
    1000461