Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

Complete computing

  • Session B-2: Internet Technology
  • Conference paper
  • First Online:

Part of the book series:Lecture Notes in Computer Science ((LNCS,volume 1368))

Abstract

Our objective is to enable nomadic and mobile computing, as well as telecommuting, small-office, and branch-office computing. These areas have been dealt with extensively in the literature. However, they have been treated as separate problem spaces and current solutions focus on solving specific problems in one area while ignoring - or even exacerbating — those in another area. These problem spaces must be viewed as being closely related, and must be addressed in a coherent fashion. We call this unified vision and architectureComplete Computing.

This work was partly funded by the Ministry of International Trade and Industry of Japan through theAdvanced Software Enrichment Project of the Information Technology Promotion Agency.

This is a preview of subscription content,log in via an institution to check access.

Access this chapter

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Atkinson, R.: Key Exchange Delegation Record for the DNS,RFC 2230, (Nov. 1997).

    Google Scholar 

  2. Aziz, A., Patterson, M.: Design and Implementation of SKIP, available on-line athttp://skip.incog.com/inet-95.ps. A previous version of the paper was presented at INET '95 under the titleSimple Key Management for Internet Protocols (SKIP), and appears in the conference proceedings under that title.

    Google Scholar 

  3. Berners-Lee, T., Masinter, L., McCahill, M.: Uniform Resource Locators (URL),RFC 1738, (Dec. 1994).

    Google Scholar 

  4. Calhoun, P., Perkins, C.: Tunnel Establishment Protocol, Internet draftdraft-ietf-mobileip-calhoun-tep-00.txt — work in progress, (1997).

    Google Scholar 

  5. Chapman, D. B., Zwicky, E.: Building Internet Firewalls, O'Reilly & Associates, Inc., (1995).

    Google Scholar 

  6. Doraswamy, N., Moskowitz, R.: Implementation of VPNs with IP Security, Internet-draft-work in progress, (1997).

    Google Scholar 

  7. Droms, R.: Dynamic Host Configuration Protocol, RFC 2131, (Mar. 1997).

    Google Scholar 

  8. Frier, A., Karlton, P., Kocher, P.: The SSL 3.0 Protocol, Netscape Communications Corp., (Nov. 1996).

    Google Scholar 

  9. Gupta, V., Glass., S.: Firewall traversal for Mobile IP: guidelines for firewalls and Mobile IP entities, Internet Draftdraft-ietf-mobile-ip-ftrewal l-tray-00.txt-work in progress, (Mar. 1997).

    Google Scholar 

  10. Gupta, V., Montenegro, G.: Secure and Mobile Networking, to appear in the ACM Journal on Special Topics in Mobile Networking and Applications (MONET), (special issue on Mobile Networking in the Internet).

    Google Scholar 

  11. Harnzeh, K., et al.: Layer Two Tunneling Protocol (L2TP), Internet Draftdraft-ietf-pppext-l2tp-08.txt — work in progress, (Nov. 1997).

    Google Scholar 

  12. Harkins, D., Carrel, D.: The resolution of ISAKMP with Oakley, Internet Draftdraft-ietf-ipsec-isakmp-oakley-05.txt-work in progress, (Nov. 1997).

    Google Scholar 

  13. Kent, S., Atkinson, R.: Security architecture for the Internet Protocol, Internet Draftdraft-ietf-ipsec-arch-sec-02.txt-work in progress, (Nov. 1997) (a previous version appears as RFC 1825).

    Google Scholar 

  14. Kent, S., Atkinson, R.: IP authentication header, Internet Draftdraft-ietf-ipse-cauth-header-03.txt — work in progress, (Nov. 1997) (a previous version appears asRFC 1826).

    Google Scholar 

  15. Kent, S., Atkinson, R.: IP encapsulating security payload, Internet Draftdraft-ietf-ipsec-esp-u2-02.txt — work in progress, (Nov. 1997) (a previous version appears asRFC 1827).

    Google Scholar 

  16. Kistler, J. J., Satyanarayanan, M.: Disconnected Operation in the Coda File System,ACM Transactions on Computer Systems,10, No. 1, (Feb. 1992) 3–25.

    Article  Google Scholar 

  17. Maughan, D., Schertler, M., Schneider, M., Turner, J.: Internet Security Association and Key Management Protocol (ISAKMP), Internet Draftdraft-ietf-ipsecisakmp-08.txt — work in progress, (Jul. 1997).

    Google Scholar 

  18. Montenegro, G.: Tunnel Set-up Protocol (TSP), Internet Draftdraft-Montenegro-tsp-00.tx — work in progress, (Aug. 1997).

    Google Scholar 

  19. Montenegro, G., Gupta, V.: Firewall support for Mobile IP, Internet Draftdraft-montenegro-faremall-sup-02.txt — work in progress, (Nov. 1997).

    Google Scholar 

  20. Orman, H.: The OAKLEY Key Determination Protocol, Internet Draftdraft-ietf-ipsec-oakley-02.txt — work in progress.

    Google Scholar 

  21. Perkins, C., (Editor): IP mobility support,RFC 2002, (Oct. 1996).

    Google Scholar 

  22. Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G. J., Lear, E.: Address allocation for private internets,RFC 1918, (Feb. 1996).

    Google Scholar 

  23. Simpson, W.: The Point-to-Point Protocol (PPP),RFC 1661, (Jul. 1994).

    Google Scholar 

  24. Veizades, J., Guttman, E., Perkins, C., Kaplan, S.: Service Location Protocol,RFC 2165, (Jun. 1997).

    Google Scholar 

  25. Yeong, W., Howes, T., Kille, S.: Lightweight Directory Access Protocol,RFC 1777, (Mar. 1995).

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Technology Development Group, Sun Microsystems, Inc., 901 San Antonio Road, MS UMPK15-214, 94303, Palo Alto, California

    Vipul Gupta, Gabriel Montenegro & Jeff Rulifson

Authors
  1. Vipul Gupta

    You can also search for this author inPubMed Google Scholar

  2. Gabriel Montenegro

    You can also search for this author inPubMed Google Scholar

  3. Jeff Rulifson

    You can also search for this author inPubMed Google Scholar

Editor information

Yoshifumi Masunaga Takuya Katayama Michiharu Tsukamoto

Rights and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gupta, V., Montenegro, G., Rulifson, J. (1998). Complete computing. In: Masunaga, Y., Katayama, T., Tsukamoto, M. (eds) Worldwide Computing and Its Applications — WWCA'98. WWCA 1998. Lecture Notes in Computer Science, vol 1368. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-64216-1_48

Download citation

Publish with us


[8]ページ先頭

©2009-2025 Movatter.jp