What are the protocols used by CSI?1 2940
Are the any interfaces specified in CORBASEC for controlling security context by security-aware applications?1 2471
How are privacy and non-repudiation addressed by CORBASEC?1 2629
How does CORBA security affect application writers?1 2739
Does CORBA security guarantee that the request and reply are not tampered and not intercepted on their way between the client and the target?1 2770
What is available in CORBASEC for strong (writer-to-reader) authentication?1 2815
What are the semantic connotations for rights in CORBA rights family?1 3289
Does the existing Authorization Service of CORBASec scale in a "well" distributed-object environment?2049
What ORBs claim to have security functionality?1 3641
What would be the most suitable ORB products when buliding a small lab for evaluating, testing and implementing security functions in a CORBA system?2209
Are CORBAsec implementations from the US generally subjected to export control?
Explain are there important forms of asynchronous communication that are not supported directly by corba?354
Can corba application be tuned for better performance?
Explain some reason to avoid the development of multi-threaded corba application?
Explain high-level technical overview of corba?
Does corba support distributed reference counting architectures?
Does corba define high level application architectures?
Is there a set of UML diagrams for the CORBASEC Specification?
Explain can corba application have call back?
What is the reason to implement corba in client application application?
Compare CORBA security with security of other distributed object computing frameworks such as Java RMI or DCOM?
What are the reason to avoid the development of multi-threaded corba application?
Explain can corba allow servers to cause client side events or notifications?
What are the shortcomings of CORBA Security service?
What is corba good for?
Explain what is corba good for?
What is corba? What does it do?