Part of the book series:Lecture Notes in Computer Science ((LNCS,volume 1368))
Included in the following conference series:
114Accesses
Abstract
Our objective is to enable nomadic and mobile computing, as well as telecommuting, small-office, and branch-office computing. These areas have been dealt with extensively in the literature. However, they have been treated as separate problem spaces and current solutions focus on solving specific problems in one area while ignoring - or even exacerbating — those in another area. These problem spaces must be viewed as being closely related, and must be addressed in a coherent fashion. We call this unified vision and architectureComplete Computing.
This work was partly funded by the Ministry of International Trade and Industry of Japan through theAdvanced Software Enrichment Project of the Information Technology Promotion Agency.
This is a preview of subscription content,log in via an institution to check access.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Atkinson, R.: Key Exchange Delegation Record for the DNS,RFC 2230, (Nov. 1997).
Aziz, A., Patterson, M.: Design and Implementation of SKIP, available on-line athttp://skip.incog.com/inet-95.ps. A previous version of the paper was presented at INET '95 under the titleSimple Key Management for Internet Protocols (SKIP), and appears in the conference proceedings under that title.
Berners-Lee, T., Masinter, L., McCahill, M.: Uniform Resource Locators (URL),RFC 1738, (Dec. 1994).
Calhoun, P., Perkins, C.: Tunnel Establishment Protocol, Internet draftdraft-ietf-mobileip-calhoun-tep-00.txt — work in progress, (1997).
Chapman, D. B., Zwicky, E.: Building Internet Firewalls, O'Reilly & Associates, Inc., (1995).
Doraswamy, N., Moskowitz, R.: Implementation of VPNs with IP Security, Internet-draft-work in progress, (1997).
Droms, R.: Dynamic Host Configuration Protocol, RFC 2131, (Mar. 1997).
Frier, A., Karlton, P., Kocher, P.: The SSL 3.0 Protocol, Netscape Communications Corp., (Nov. 1996).
Gupta, V., Glass., S.: Firewall traversal for Mobile IP: guidelines for firewalls and Mobile IP entities, Internet Draftdraft-ietf-mobile-ip-ftrewal l-tray-00.txt-work in progress, (Mar. 1997).
Gupta, V., Montenegro, G.: Secure and Mobile Networking, to appear in the ACM Journal on Special Topics in Mobile Networking and Applications (MONET), (special issue on Mobile Networking in the Internet).
Harnzeh, K., et al.: Layer Two Tunneling Protocol (L2TP), Internet Draftdraft-ietf-pppext-l2tp-08.txt — work in progress, (Nov. 1997).
Harkins, D., Carrel, D.: The resolution of ISAKMP with Oakley, Internet Draftdraft-ietf-ipsec-isakmp-oakley-05.txt-work in progress, (Nov. 1997).
Kent, S., Atkinson, R.: Security architecture for the Internet Protocol, Internet Draftdraft-ietf-ipsec-arch-sec-02.txt-work in progress, (Nov. 1997) (a previous version appears as RFC 1825).
Kent, S., Atkinson, R.: IP authentication header, Internet Draftdraft-ietf-ipse-cauth-header-03.txt — work in progress, (Nov. 1997) (a previous version appears asRFC 1826).
Kent, S., Atkinson, R.: IP encapsulating security payload, Internet Draftdraft-ietf-ipsec-esp-u2-02.txt — work in progress, (Nov. 1997) (a previous version appears asRFC 1827).
Kistler, J. J., Satyanarayanan, M.: Disconnected Operation in the Coda File System,ACM Transactions on Computer Systems,10, No. 1, (Feb. 1992) 3–25.
Maughan, D., Schertler, M., Schneider, M., Turner, J.: Internet Security Association and Key Management Protocol (ISAKMP), Internet Draftdraft-ietf-ipsecisakmp-08.txt — work in progress, (Jul. 1997).
Montenegro, G.: Tunnel Set-up Protocol (TSP), Internet Draftdraft-Montenegro-tsp-00.tx — work in progress, (Aug. 1997).
Montenegro, G., Gupta, V.: Firewall support for Mobile IP, Internet Draftdraft-montenegro-faremall-sup-02.txt — work in progress, (Nov. 1997).
Orman, H.: The OAKLEY Key Determination Protocol, Internet Draftdraft-ietf-ipsec-oakley-02.txt — work in progress.
Perkins, C., (Editor): IP mobility support,RFC 2002, (Oct. 1996).
Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G. J., Lear, E.: Address allocation for private internets,RFC 1918, (Feb. 1996).
Simpson, W.: The Point-to-Point Protocol (PPP),RFC 1661, (Jul. 1994).
Veizades, J., Guttman, E., Perkins, C., Kaplan, S.: Service Location Protocol,RFC 2165, (Jun. 1997).
Yeong, W., Howes, T., Kille, S.: Lightweight Directory Access Protocol,RFC 1777, (Mar. 1995).
Author information
Authors and Affiliations
Technology Development Group, Sun Microsystems, Inc., 901 San Antonio Road, MS UMPK15-214, 94303, Palo Alto, California
Vipul Gupta, Gabriel Montenegro & Jeff Rulifson
- Vipul Gupta
You can also search for this author inPubMed Google Scholar
- Gabriel Montenegro
You can also search for this author inPubMed Google Scholar
- Jeff Rulifson
You can also search for this author inPubMed Google Scholar
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gupta, V., Montenegro, G., Rulifson, J. (1998). Complete computing. In: Masunaga, Y., Katayama, T., Tsukamoto, M. (eds) Worldwide Computing and Its Applications — WWCA'98. WWCA 1998. Lecture Notes in Computer Science, vol 1368. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-64216-1_48
Download citation
Published:
Publisher Name:Springer, Berlin, Heidelberg
Print ISBN:978-3-540-64216-9
Online ISBN:978-3-540-69704-6
eBook Packages:Springer Book Archive
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative