tailieunhanh - Mastering Web Services Security p5

CORBA, WSDL dịch vụ Web, các tập tin với Java giao diện mở rộng EJBObject trong J2EE, và các tập tin lớp được truy cập từ xa ". NET. Skeleton. Các đối tác của máy chủ proxy. Cũng tạo ra từ định nghĩa giao diện, một bộ xương thực hiện marshaling / unmarshaling của các thông số cuộc gọi | 162 Chapter 7 CORBA WSDL files in Web Services files with Java interfaces extending EJBOb-ject in J2EE and remoted class files in .NET. Skeleton. The server s counterpart of the proxy. Also created from the interface definition a skeleton performs marshaling unmarshaling of the call parameters and return values and hides specifics of the particular ORB implementation. Object adapter. Sits on top of the object request broker ORB and accepts requests on behalf of the server s objects. It provides the runtime environment for instantiating server objects passing requests to them and assigning the object IDs called object references. The object adapter also registers object implementations with the ORB and sometimes with the implementation repository so that the server objects can be discovered at run time. Not all middleware technologies for example COM distinguish object adapters from their ORBs although the adapters are still there. Object request broker ORB . Constitutes the core of the middleware layer and implements most of the plumbing including composition of the messages given to the network layer for sending determining where to send messages based on the object reference establishing virtual session channels with other ORBs and dispatching requests to the server objects. An ORB could be implemented just as a library like most CORBA ORBs or could be a set of system services as in COM . It cooperates with various services such as naming fault tolerance transactions and load balancing to make the life of clients and servers easier. In this discussion we concentrate on the security service. Security service. Often tightly integrated with the ORB the service intercepts the client s and server s interactions to enforce various security policies. Some of them such as access control have request granularity and therefore are enforced by request security interceptors. Other policies such as integrity and confidentiality protection are commonly enforced by message .

TÀI LIỆU MỚI ĐĂNG
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.