Personal tools
You are here: Home Tutorials WORLDCOMP'09 Tutorial: Prof. Ray Kresman
Current Event
Click Here
Other Events
Click Here

Click Here

Click Here

Click Here

Click Here

Click Here

WORLDCOMP'06 & '07
Click Here

Join Our Mailing List
Sign up to receive email announcements and updates about conferences and future events


WORLDCOMP'09 Tutorial: Prof. Ray Kresman

Last modified 2009-07-03 11:00

Cryptographic Features and Applications: Java (C)
Prof. Ray Kresman
Bowling Green State University, USA

Date: July 15, 2009
Time: 6:00 - 9:30 PM
Location: Ballroom 2


      Java is already becoming the preferred language of choice for both stand-alone and web enabled applications. However, aspects of Java Cryptography are less well understood. Java Cryptography has relevance in network security, and in the design and deployment of real-life secure Java application by software developers. For example, the Java Cryptographic Extension (JCE) promises plug-in cryptographic libraries and seamless addition of a number of security components and services such as message digests, digital signatures, random number generators and algorithms for symmetric and public key cryptography.

      This 3-hour tutorial provides an overview of network security and Java cryptographic library features. We will describe some of the cryptographic mechanisms, and their use, in Java. Where applicable, we will also discuss application of these techniques in C++. Attendees will benefit from the interaction and building/examining software components for securing applications.

    Objectives of the Tutorial

      • Understand basics of cryptography and their provisions in Java
      • Be familiar with the role of Java security manager
      • Know how to override methods of the security manager
      • Know the methods and usage options of Java cryptographic modules
      • Write cryptographic programs for computing digests and doing authentications
      • Understand basics of SSL and their deployment in Java

    Intended Audience

      This tutorial is geared for information analysts, computer professionals and software developers who want to understand or write real-life secure applications.

    Background of the Audience

      Web surfing. Proficiency in object-oriented concepts in Java and/or C++ programming languages. Exposure to security concepts such as digests, encryption and certificates, while a plus, is not necessary.

    Tutorial Outline

      • Network Security (15 Minutes)
      • Language overview (15 minutes)
          - Java Overview and relationship to C++
          - Applets & applications
      • Java security (20 minutes)
          - Visibility and security features
          - Rights of application
          - Rights of Applet
      • Java Cryptographic Extension (JCE) (20 minutes)
          - Security
          - What is JCE?
          - JCE components
          - JCE in applications and applets.
      • Secure communication (20 minutes)
          - DES classes
          - Member functions
          - Implementation of DES
          - Java and C++ examples
      • Key Exchange (20 minutes)
          - Key exchange b/w strangers
          - Diffie Hellman protocol
          - MD5 and Secure hash
          - Java and C++ examples
      • Digest Algorithms (20 minutes)
          - Message digest class
          - Securing a digest in Java
          - MD5 and Secure hash
          - Java and C++ examples
      • Secure Socket Layer (20 minutes)
          - How does it work?
          - Encapsulation
      • Questions and Answers, Concluding Remarks (20 minutes)

    Biography of Instructor

      Ray Kresman is a Professor of Computer Science at Bowling Green State University, Bowling Green, OH. His applied computer science interests include computer security and web-to-database connectivity, three-tier architectures and secure internet technologies, and data warehousing. Dr. Kresman's work on distributed systems was supported by the National Science Foundation. He has published widely in the area of distributed systems and complexity of algorithms.

      Dr. Ray Kresman
      Professor of Computer Science
      Bowling Green State University
      Bowling Green, OH, USA

Academic Co-Sponsors

United States Military Academy, Network Science Center

Biomedical Cybernetics Laboratory, HST of Harvard University and MIT, USA

Argonne's Leadership Computing Facility of Argonne National Laboratory

Functional Genomics Laboratory, University of Illinois at Urbana-Champaign, USA
Minnesota Supercomputing Institute, University of Minnesota, USA
Intelligent Data Exploration and Analysis Laboratory, University of Texas at Austin, Austin, Texas, USA
Harvard Statistics Department Genomics & Bioinformatics Laboratory, Harvard University, USA

Texas Advanced Computing Center, The University of Texas at Austin, Texas

Center for the Bioinformatics and Computational Genomics, Georgia Institute of Technology, Atlanta, Georgia, USA

Bioinformatics & Computational Biology Program, George Mason University, Virginia, USA

Institute of Discrete Mathematics and Geometry, Vienna University of Technology, Austria

BioMedical Informatics & Bio-Imaging Laboratory, Georgia Institute of Technology and Emory University, Atlanta, Georgia, USA
Knowledge Management & Intelligent System Center (KMIS) of University of Siegen, Germany

National Institute for Health Research, UK

Hawkeye Radiology Informatics, Department of Radiology, College of Medicine, University of Iowa, Iowa, USA

Institute for Informatics Problems of the Russian Academy of Sciences, Moscow, Russia.
Medical Image HPC & Informatics Lab (MiHi Lab), University of Iowa, Iowa, USA
SECLAB An inter-university research group (University of Naples Federico II, the University of Naples Parthenope, and the Second University of Naples, Italy)
The University of North Dakota, Grand Forks, North Dakota, USA
Intelligent Cyberspace Engineeing Lab., ICEL, Texas A&M; University (Com./Texas)

International Society of Intelligent Biological Medicine

World Academy of Biomedical Sciences and Technologies

Corporate Sponsor

Other Co-Sponsors
European Commission
High Performance Computing for Nanotechnology (HPCNano)

HoIP - Health without Boundaries

Hodges' Health

The International Council on Medical and Care Compunetics

GridToday - enewsletter focused on Grid, SOA, Virtualization, Storage, Networking and Service-Oriented IT

HPCwire - The Leading Source for Global News and Information Covering the Ecosystem of High Productivity Computing

The UK Department for Business, Enterprise & Regulatory Reform
VMW Solutions Ltd.
Scientific Technologies Corporation

Bentham Science Publishers


Administered by UCMSS
Universal Conference Management Systems & Support
San Diego, California, USA
Contact: Kaveh Arbtan

If you can read this text, it means you are not experiencing the Plone design at its best. Plone makes heavy use of CSS, which means it is accessible to any internet browser, but the design needs a standards-compliant browser to look like we intended it. Just so you know ;)