Skip to main content

The gateway security model in the Java Electronic Commerce Framework

  • Conference paper
  • First Online:
Book cover Financial Cryptography (FC 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1318))

Included in the following conference series:

Abstract

This paper describes an extension to the current Java security model called the “Gateway” and why it was necessary to create it. This model allows secure applications, such as those used in electronic commerce, to safely exchange data and interoperate without compromising each individual application's security. The Gateway uses digital signatures to enable application programming interfaces to authenticate their caller. JavaSoft is using the Gateway to create a new integrated open platform for financial applications called Java Electronic Commerce Framework. The JECF will be the foundation for electronic wallets, point of sale terminals, electronic merchant servers and other financial software. The Gateway model can also be used for access control in many multiple application environments that require trusted interaction between applications from multiple vendors. These applications include browsers, servers, operating systems, medical systems and smartcards.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agorics Inc. http://www.agorics.com/allkey.html, September 15 1996.

    Google Scholar 

  2. V. Bertis. Security and Protection of Data in the IBM System/38 in Proceedings of the 7th Symposium on Computer Architecture,. May 1980.

    Google Scholar 

  3. J. B. Dennis and E. C. Van Hom, Programming Semantics for Multiprogrammed Computations. Communications of the ACM 9(3), March 1966.

    Google Scholar 

  4. E. Gamma, R. Helm, R. Johnson, J. Vlissides, Design Patterns, Elements of Object-Oriented Software, Addison Wesley 1995.

    Google Scholar 

  5. J. Gosling, W. N. Joy, F. Yellin; The Java Programming Language Addison Wesley 1996.

    Google Scholar 

  6. A Goldberg, D Robson, The Smalltalk-80 Language, Addison Wesley 1983.

    Google Scholar 

  7. G. Hamilton, M. Powell, J. Mitchell Subcontract: A Flexible Base for Distributed Computing. Symposium on Operating Systems Principles

    Google Scholar 

  8. K.G. Hamilton, The Java Beans Specification, http://java.sun.com/.

    Google Scholar 

  9. http://java.sun.com/commerce.

    Google Scholar 

  10. MasterCard/Visa Secure Electronic Transaction Protocol Specification (S.E.T.), http://www.mastercard.com/ and http://www.visa.com/.

    Google Scholar 

  11. M. Mueller, The Java Security Model, http://java.sun.com/

    Google Scholar 

  12. Object Management Group, The Common Object Request Broker, http://www.omg.org/.

    Google Scholar 

  13. W. Wulf, E. Cohen, W. Corwin, A. Jones, R. Levin, C. Pierson, and F. Pollack. Hydra: The Kernel of a Multiprocessor Operating System, Communications of the ACM 17(6), June 1974.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Rafael Hirschfeld

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Goldstein, T. (1997). The gateway security model in the Java Electronic Commerce Framework. In: Hirschfeld, R. (eds) Financial Cryptography. FC 1997. Lecture Notes in Computer Science, vol 1318. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-63594-7_90

Download citation

  • DOI: https://doi.org/10.1007/3-540-63594-7_90

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63594-9

  • Online ISBN: 978-3-540-69607-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics