Secure Instant Messaging : the Jabber protocol Public Deposited

http://ir.library.oregonstate.edu/concern/graduate_thesis_or_dissertations/xw42nb00r

Descriptions

Attribute NameValues
Creator
Abstract or Summary
  • Instant Messaging (IM) has grown rapidly among network users. It has even become a very important tool for the industry around the world. It is used in scheduling meetings, exchanging business information and clients information, and so on. Instant Messaging has been developed by private sectors or providers such as America Online Instant Messenger (AIM), MSN, and Yahoo; however, in 1998 a new protocol has seen the light as an open source Instant Messaging protocol and had the name of Jabber and thanks to Jeremie Miller the founder of the Jabber protocol. The project gathered wide public attention when it was discussed on the popular developer discussion website Slashdot in January 1999. In May 2000, the core Jabber protocols were released as open source reference server and it have not been changed to this day. Jabber uses client-server architecture, not a direct peer-to-peer architecture as some other messaging systems do. It is actually an Extensible Markup Language (XML) messaging protocol. It relies on XML document format in every aspect of the communication. [1] Jabber Protocol have gone a long way to be one of the most attractive protocol because of its open source and extensibility. Anyone can build or extend the jabber protocol functionality without actually modifying the core protocol and still maintain interoperability with other IM clients such as Yahoo and MSN. Moreover, as the usage of Jabber Instant Messaging technology increases, the need for information protection in the Jabber messaging medium also increases. This thesis will explore the Jabber protocol and the ability to secure a Jabber based communication over the network using third party cryptographic libraries.
Resource Type
Date Available
Date Copyright
Date Issued
Degree Level
Degree Name
Degree Field
Degree Grantor
Commencement Year
Advisor
Academic Affiliation
Non-Academic Affiliation
Subject
Rights Statement
Peer Reviewed
Language
Digitization Specifications
  • File scanned at 300 ppi (Monochrome, 256 Grayscale) using Capture Perfect 3.0.82 on a Canon DR-9080C in PDF format. CVista PdfCompressor 4.0 was used for pdf compression and textual OCR.
Replaces
Additional Information
  • description.provenance : Approved for entry into archive by Patricia Black(patricia.black@oregonstate.edu) on 2012-07-31T16:19:42Z (GMT) No. of bitstreams: 1 AlmaneiSaleh2003.pdf: 2866265 bytes, checksum: 651d333bfc1c947511cbc4cb329cd30f (MD5)
  • description.provenance : Made available in DSpace on 2012-07-31T16:19:42Z (GMT). No. of bitstreams: 1 AlmaneiSaleh2003.pdf: 2866265 bytes, checksum: 651d333bfc1c947511cbc4cb329cd30f (MD5) Previous issue date: 2003-06-03
  • description.provenance : Submitted by Kevin Martin (martikev@onid.orst.edu) on 2012-07-19T18:54:03Z No. of bitstreams: 1 AlmaneiSaleh2003.pdf: 2866265 bytes, checksum: 651d333bfc1c947511cbc4cb329cd30f (MD5)
  • description.provenance : Approved for entry into archive by Patricia Black(patricia.black@oregonstate.edu) on 2012-07-25T16:55:35Z (GMT) No. of bitstreams: 1 AlmaneiSaleh2003.pdf: 2866265 bytes, checksum: 651d333bfc1c947511cbc4cb329cd30f (MD5)

Relationships

Parents:

This work has no parents.

Last modified

Downloadable Content

Download PDF

Items