Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Roger Kehr is active.

Publication


Featured researches published by Roger Kehr.


distributed systems operations and management | 1999

A Framework for the Integration of Legacy Devices into a Jini Management Federation

Gerd Aschemann; Svetlana Domnitcheva; Peer Hasselmeyer; Roger Kehr; Andreas Zeidler

The administration of heterogeneous networks with many devices is a tedious and time-consuming task. Todays approaches only provide static configuration files and make the addition and removal of devices a manual chore. In this paper we present a framework for the integration of legacy devices based on Jini, Sun Microsystems new technology for federating network devices and services. We introduce extended proxy objects called nannies that take care of non-Jini-enabled devices and handle the relevant management events, guide a device through bootstrapping, register it with the lookup service, and provide the implementation of the administrative interfaces of the Jini API. Through this approach both Jini-enabled and legacy devices can be handled homogeneously in a Jini Management Federation.


Java-Informations-Tage | 1999

A Jini-based Gateway Architecture for Mobile Devices

Gerd Aschemann; Roger Kehr; Andreas Zeidler

In the near future we expect a widespread deployment of mobile computational resources including network-enabled end devices like Laptops and PDAs. An interesting problem then and today is the transparent change of locality. Traditionally several manual actions are necessary to reconfigure the device and to rebind client-applications to services available in the host network. This paper presents the architecture of a Jini-based Application Level Gateway (ALGW) which avoids manual reconfiguration of a mobile device every time the user changes the host network. To do so, the ALGW makes use of key technologies provided by Jini. Jini is used for dynamic looking up and binding to services needed by the user and located in the host network. Moreover, Jini can be used for value-added services like our authenticating SMTP-Service.


Lecture Notes in Computer Science | 2000

Trade-offs in a Secure Jini Service Architecture

Peer Hasselmeyer; Roger Kehr; Marco Voß

Jini is an infrastructure built on top of the mobile code facilities of the Java programming language enabling clients and services to spontaneously engage in arbitrary usage scenarios. For a small home or office environment the currently available infrastructure might be adequate, but for mission-critical applications it lacks essential security properties. In the sequel we identify weak points in the Jini architecture and its protocols and propose an extension to the architecture that provides a solution to the identified security problems. We describe the design choices underlying our implementation which aims at maximum compatibility with the existing Jini specifications.


cooperative distributed systems | 1998

Towards a requirements-based information model for configuration management

Gerd Aschemann; Roger Kehr

Several architectures are defined for distributed systems management, most of which stem from the network management domain. They all share the idea of multiple models, at least comprising an information model, a communication model, and a functional model. Configuration management is part of the functional model but is very dependent on the information model. Due to its history in network management, the information model itself is mostly restricted to describe a priori known properties of hardware entities or software entities closely bound to the hardware point of view. Modeling the dynamic relationships of distributed systems and applications with such a model is hard if not impossible. Therefore we propose a new information model that focuses on the dynamic description of distributed systems. By using object-oriented technologies such as a prototype-instance model, it is well suited for the actual demands of system administration. Since we do not explicitly combine it with a particular distribution mechanism, it is orthogonal to any given or future communication model. We present an exemplary case study in the analysis to our approach, and we describe the design and implementation of our model.


Lecture Notes in Computer Science | 2001

SIMspeak - Towards an Open and Secure Application Platform for GSM SIMs

Roger Kehr; Hendrik Mieves

Today mobile operators are in the possession of the SIM application toolkit technology available in their GSM SIM smartcards plugged into the mobile handsets of their subscribers. Although there are roughly 500 mio. SIMs deployed all over the world, they are not integrated into the Internet yet. With the WebSIM approach [6] we have demonstrated how SIMs can be integrated into the Internet by means of a tiny HTTP server implemented in a SIMto provide value-added services running on top of the SIM toolkit.In this contribution we propose to further extend this approach by making SIMs accessible as open and secure execution platforms for mobile code. Here, open means that virtually anybody in the Internet can use this mobile code platform, and secure means that both - platform and subscriber - cannot be harmed by malicious code. Such a platform can be provided by operators upon which third-party service providers can build their applications which would benefit from the security context of the smartcard they run inside.The SIMspeak system is comprised of an off-card compiler, a verifier, and a corresponding card-resident interpreter, which can interpret code that has been pushed by an Internet service provider into a customers SIM. We describe the underlying trust model of SIMspeak, its architecture, language, and protocols. Furthermore we present approaches for end-to-end security that influence the design of the compiler, verifier, and interpreter and we give an overview on the current status of our implementation.


Archive | 2000

Spontane Vernetzung: Infrastrukturkonzepte für die Post-PC Ära

Roger Kehr

ein beliebiges netzwerkfähiges Gerät, wie beispielsweise ein Drucker, wird an seinem neuen Einsatzort aufgestellt, eingeschaltet und mit dem Netzwerk verbunden. Der Drucker meldet sich automatisch bei einem Verzeichnisdienst, registriert seine spezifischen Merkmale und ist daraufhin von allen Personen in der Nähe benutzbar. Keinerlei Konfigurationen, keinerlei Administration, schöne neue Welt. Ein anderes Szenario spielt sich in


Archive | 1999

Towards a generic proxy execution service for small devices

Roger Kehr; Andreas Zeidler; Harald Vogt


Cahiers GUTenberg | 1998

x indy — A Flexible Indexing System

Roger Kehr


Informatik Spektrum | 2000

Spontane Vernetzung: Infrastrukturkonzepte fuer die Post-PC-Ära.

Roger Kehr


Archive | 2000

Yet Another Answer to "Where am I?

Andreas Zeidler; Roger Kehr

Collaboration


Dive into the Roger Kehr's collaboration.

Top Co-Authors

Avatar

Andreas Zeidler

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Peer Hasselmeyer

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Gerd Aschemann

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Hendrik Mieves

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Marco Voß

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Svetlana Domnitcheva

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge