Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


How does CORBA security affect application writers?



How does CORBA security affect application writers?..

Answer / rithi

Linda Gricius (March, 1998):

In a secure CORBA system, the same client calls the same
target object that it would call in an unsecured system. The
invocation request is intercepted by the ORB Security
service at both client and target, and the level of
protection required by the current policy settings is
applied. Security may be enforced at the client side, the
target side, or both. This includes support for any or all
of the following:

* Establishing secure associations between the client
and target;
* Integrity and/or confidentiality protection for
individual requests and replies sent between the client and
target;
* Access control checks to determine if the principal is
allowed to perform this operation on the target object;
* Auditing of security-relevant events.

Since the invocation is intercepted in the ORB, it is
transparent to the application. However, applications that
want to enforce their own security controls can call on the
Security services directly.

It's important to note that object implementations do not
need to be changed to fit into and be protected by a secure
ORB. A distributed application may be made up of many small
objects, and it is unusual for all the application
developers to be sufficiently security knowledgeable to make
the right calls on the security facilities.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CORBA Interview Questions

Explain does corba supports asynchronous communication?

0 Answers  


Does the existing Authorization Service of CORBASec scale in a "well" distributed-object environment?

0 Answers  


What's CORBA Security Service?

1 Answers  


Are there any upcoming updates of the CORBA specification?

1 Answers  


Does CORBA security guarantee that the request and reply are not tampered and not intercepted on their way between the client and the target?

1 Answers  


What is CORBA?

1 Answers   Satyam, TATA,


What are the protocols used by CSI?

1 Answers  


What are the primary differences between RMI and CORBA?

2 Answers  


Compare CORBA security with security of other distributed object computing frameworks such as Java RMI or DCOM?

0 Answers  


What is available in CORBASEC for strong (writer-to-reader) authentication?

1 Answers  


Does corba support distributed reference counting architectures?

0 Answers  


Are CORBAsec implementations from the US generally subjected to export control?

0 Answers   HCL,


Categories