Appendix A. Security of Distributed Object Architectures

 <  Day Day Up  >  

Common Gateway Interface (CGI) programs use a transaction model: The client issues a transaction request and then waits until the server returns the results. Distributed object architectures offer a more elegant approach; the object space that an applet or an application is working with is extended to include objects on different systems. Client-side Java and server-side Java can be combined to create a fully distributed architecture, in which functions can be split between the client and the server to optimize processing and network loads.

Distributed object architectures have a number of advantages, including security advantages, over more conventional transactional systems. For example, you can design systems in which mission-critical objects may be kept safe behind a firewall, with access allowed only via method calls from clients. This is far safer than shipping data out of the organization to multiple clients who may simultaneously make changes.

To aid in the creation of distributed architectures, Java provides a toolkit called Remote Method Invocation (RMI). This toolkit extends the Java object model to the network by allowing objects in one JVM to invoke methods seamlessly on objects in another, remote, JVM. The remote JVM can, in turn , invoke other remote objects.

 <  Day Day Up  >  


Enterprise Java Security. Building Secure J2EE Applications
Enterprise Javaв„ў Security: Building Secure J2EEв„ў Applications
ISBN: 0321118898
EAN: 2147483647
Year: 2004
Pages: 164

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net