Introduction

  

Distributed computing has evolved through the years to allow parts of an enterprise system to be located on separate and possibly heterogeneous platforms. These systems may also be located in different geographic areas. For example, there is no reason why a database located in Europe cannot be accessed by a transaction manager in London.

Among the building blocks of distributed computing are distributed objects. Distributed objects allow objects that perform a specific task to reside in different machines and to be accessed to provide a complete solution. These distributed objects can be assembled into components to encapsulate a behavior or provide a specific solution to part of a problem. The J2EE model can be used to assemble a solution and is one of several enterprise component models in the industry. Other models include those defined by the Microsoft Corporation and the Object Management Group (OMG). These distributed solutions typically require security.

When an application (distributed or otherwise ) provides security, there is an expectation to safeguard user privacy, to ensure that information (such as transactions and data) is not tampered with either accidentally or maliciously, and to prevent theft. Authorized users should be able to access the information they are authorized to access, and unauthorized users should not. Even so, the level of security needed for the given application depends on the value of the information to be protected and the software and hardware involved. In addition, there are usually compromises that you must make in cost, usability, and security.

  


Java Security Solutions
Java Security Solutions
ISBN: 0764549286
EAN: 2147483647
Year: 2001
Pages: 222

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net