Treffer: Dissection of the internal workings of the RMI, possible enhancements and implementing authentication in standard Java RMI

Title:
Dissection of the internal workings of the RMI, possible enhancements and implementing authentication in standard Java RMI
Source:
International journal of networking and virtual organisations. 7(6):514-534
Publisher Information:
Genève: Inderscience Publishers, 2010.
Publication Year:
2010
Physical Description:
print, 1 p
Original Material:
INIST-CNRS
Subject Terms:
Control theory, operational research, Automatique, recherche opérationnelle, Computer science, Informatique, Sciences exactes et technologie, Exact sciences and technology, Sciences appliquees, Applied sciences, Informatique; automatique theorique; systemes, Computer science; control theory; systems, Logiciel, Software, Systèmes informatiques et systèmes répartis. Interface utilisateur, Computer systems and distributed systems. User interface, Organisation des mémoires. Traitement des données, Memory organisation. Data processing, Gestion des mémoires et des fichiers (y compris la protection et la sécurité des fichiers), Memory and file management (including protection and security), Performances des systèmes informatiques. Fiabilité, Computer systems performance. Reliability, Algorithme réparti, Distributed algorithm, Algoritmo repartido, Appel procédure à distance, Remote procedure calls, Authentification, Authentication, Autenticación, Calcul réparti, Distributed computing, Cálculo repartido, Composant logiciel, Software component, Componente logicial, Coopération entreprise, Firm cooperation, Cooperación empresa, Disponibilité, Availability, Disponibilidad, Distribution charge, Load distribution, Distribución carga, Débogage, Debugging, Puesta a punto programa, Entreprise, Firm, Empresa, Langage JAVA, JAVA language, Lenguaje JAVA, Orienté objet, Object oriented, Orientado objeto, Processus communication, Communication process, Proceso comunicación, Service web, Web service, Servicio web, Système réparti, Distributed system, Sistema repartido, Sécurité informatique, Computer security, Seguridad informatica, Transmission asynchrone, Asynchronous transmission, Transmisión asincrónica, RMI architecture, RMI, client authentication in the RMI, internal workings of the RMI, remote method invocation, security
Document Type:
Fachzeitschrift Article
File Description:
text
Language:
English
Author Affiliations:
IT Department Faculty of Technology Dharmsinh Desai University College Road, Nadiad ― 387001, Gujarat, India
ISSN:
1470-9503
Rights:
Copyright 2015 INIST-CNRS
CC BY 4.0
Sauf mention contraire ci-dessus, le contenu de cette notice bibliographique peut être utilisé dans le cadre d’une licence CC BY 4.0 Inist-CNRS / Unless otherwise stated above, the content of this bibliographic record may be used under a CC BY 4.0 licence by Inist-CNRS / A menos que se haya señalado antes, el contenido de este registro bibliográfico puede ser utilizado al amparo de una licencia CC BY 4.0 Inist-CNRS
Notes:
Computer science; theoretical automation; systems
Accession Number:
edscal.23336940
Database:
PASCAL Archive

Weitere Informationen

The Java Remote Method Invocation (RMI) is a well-known solution for remote method call. However, the standard Java RMI lacks features like service availability, load sharing, authentication and authorisation of client, data security and asynchronous communication, which are desirable in any enterprise distributed application. To enhance or add any new functionality in the RMI runtime, a detailed study of its internal workings is required. We debug and analyse RMI programs to understand the internal workings of the RMI architecture. We present the components involved and their responsibilities, detailed internal communication process and feasible enhancements at different layers of the RMI architecture. We compare the RMI with other distributed computing technologies like Common Object Request Broker Architecture (CORBA) and web services. We also discuss possible enhancements in the RMI runtime, which could perfect it for a real enterprise application. As a proof of concept, we also discuss the implementation details of providing a client authentication functionality by modifying the RMI runtime. In addition to programmers, this contribution will also help the research community and the RMI runtime providers to enhance the RMI runtime.