Secure Instant Messaging : the Jabber protocol

Instant Messaging (IM) has grown rapidly among network users. It has even become a very important tool for the industry around the world. It is used in scheduling meetings, exchanging business information and clients information, and so on. Instant Messaging has been developed by private sectors or...

Full description

Bibliographic Details
Main Author: Almanei, Saleh
Other Authors: Koc, Cetin K.
Language:en_US
Published: 2012
Subjects:
Online Access:http://hdl.handle.net/1957/31683
id ndltd-ORGSU-oai-ir.library.oregonstate.edu-1957-31683
record_format oai_dc
spelling ndltd-ORGSU-oai-ir.library.oregonstate.edu-1957-316832012-08-01T03:13:05ZSecure Instant Messaging : the Jabber protocolAlmanei, SalehInstant messagingJabber (Computer network protocol)Instant Messaging (IM) has grown rapidly among network users. It has even become a very important tool for the industry around the world. It is used in scheduling meetings, exchanging business information and clients information, and so on. Instant Messaging has been developed by private sectors or providers such as America Online Instant Messenger (AIM), MSN, and Yahoo; however, in 1998 a new protocol has seen the light as an open source Instant Messaging protocol and had the name of Jabber and thanks to Jeremie Miller the founder of the Jabber protocol. The project gathered wide public attention when it was discussed on the popular developer discussion website Slashdot in January 1999. In May 2000, the core Jabber protocols were released as open source reference server and it have not been changed to this day. Jabber uses client-server architecture, not a direct peer-to-peer architecture as some other messaging systems do. It is actually an Extensible Markup Language (XML) messaging protocol. It relies on XML document format in every aspect of the communication. [1] Jabber Protocol have gone a long way to be one of the most attractive protocol because of its open source and extensibility. Anyone can build or extend the jabber protocol functionality without actually modifying the core protocol and still maintain interoperability with other IM clients such as Yahoo and MSN. Moreover, as the usage of Jabber Instant Messaging technology increases, the need for information protection in the Jabber messaging medium also increases. This thesis will explore the Jabber protocol and the ability to secure a Jabber based communication over the network using third party cryptographic libraries.Graduation date: 2003Koc, Cetin K.2012-07-31T16:19:42Z2012-07-31T16:19:42Z2003-06-032003-06-03Thesis/Dissertationhttp://hdl.handle.net/1957/31683en_US
collection NDLTD
language en_US
sources NDLTD
topic Instant messaging
Jabber (Computer network protocol)
spellingShingle Instant messaging
Jabber (Computer network protocol)
Almanei, Saleh
Secure Instant Messaging : the Jabber protocol
description Instant Messaging (IM) has grown rapidly among network users. It has even become a very important tool for the industry around the world. It is used in scheduling meetings, exchanging business information and clients information, and so on. Instant Messaging has been developed by private sectors or providers such as America Online Instant Messenger (AIM), MSN, and Yahoo; however, in 1998 a new protocol has seen the light as an open source Instant Messaging protocol and had the name of Jabber and thanks to Jeremie Miller the founder of the Jabber protocol. The project gathered wide public attention when it was discussed on the popular developer discussion website Slashdot in January 1999. In May 2000, the core Jabber protocols were released as open source reference server and it have not been changed to this day. Jabber uses client-server architecture, not a direct peer-to-peer architecture as some other messaging systems do. It is actually an Extensible Markup Language (XML) messaging protocol. It relies on XML document format in every aspect of the communication. [1] Jabber Protocol have gone a long way to be one of the most attractive protocol because of its open source and extensibility. Anyone can build or extend the jabber protocol functionality without actually modifying the core protocol and still maintain interoperability with other IM clients such as Yahoo and MSN. Moreover, as the usage of Jabber Instant Messaging technology increases, the need for information protection in the Jabber messaging medium also increases. This thesis will explore the Jabber protocol and the ability to secure a Jabber based communication over the network using third party cryptographic libraries. === Graduation date: 2003
author2 Koc, Cetin K.
author_facet Koc, Cetin K.
Almanei, Saleh
author Almanei, Saleh
author_sort Almanei, Saleh
title Secure Instant Messaging : the Jabber protocol
title_short Secure Instant Messaging : the Jabber protocol
title_full Secure Instant Messaging : the Jabber protocol
title_fullStr Secure Instant Messaging : the Jabber protocol
title_full_unstemmed Secure Instant Messaging : the Jabber protocol
title_sort secure instant messaging : the jabber protocol
publishDate 2012
url http://hdl.handle.net/1957/31683
work_keys_str_mv AT almaneisaleh secureinstantmessagingthejabberprotocol
_version_ 1716392614050136064