Java and ActiveX Projects
|
|
- Barbara Jefferson
- 7 years ago
- Views:
Transcription
1 The Open Group Research Institute Java and ActiveX Projects G.N.Madhusudan Principal Research Scientist The OpenGroup Research Institute
2 Web and Security - Outline of Projects Secure Enterprise Web Projects DCE-Web foundation Current Groupware extensions - Sweden Post Prism extensions WIRE extensions ACL Plug-ins JADE ActiveX Core PST ADAGE and Rules-based Authorization SHAWS and Distributed Clients
3 JADE JADE - Java and DCE
4 Goals Allow DCE clients to be written in Java Java access to DCE runtime through native method classes Compatibility with existing DCE servers A minimal object model Portions of the DCE runtime in pure Java Java based DCE servers as a follow-on
5 JADE Benefits Make it possible to access DCE services from Java applications obtained through Secure Web access DCE internal services (e.g. name service) access DCE application services (e.g. banking service) Extend Java security by using DCE security enhance applet authentication a DCE aware Security Manager could grant the applet extra rights
6 JADE - Overview Java application Client Proxy JIDL generated Java DCE API Marshalling and rpc DCE Runtime
7 Objects and references Object = DCE server, or server resource Remote method invocation layered on RPC Object Reference = Binding Handle non-null UUID: multiple objects per server null UUID: server is the object server 1 uuid1 uuid2 uuid3 server 2
8 Client-side proxy Allows location-transparent access to server Methods are stubs compiled from IDL Proxy per binding handle (not per object) Additional methods: bind from NS or string client server proxy1 proxy2 proxy3 RPC obj1 obj2 obj3
9 IDL to Java IDL interface Java interface + stub class IDL operation Java method [uuid ( )] interface printer { boolean print([in]file, [user]u); void status([out]queue q); } interface printer { Boolean print(file f, user u); void status(queue q); } public class printerproxy extends ProxyBase implements printer { private printerproxy(rpchandle rpc) throws DceException { } public print(file f, user u) { f.marshal(rpc); u.marshal(rpc);. } public printer bind(rpchandle rpc) { return printerproxy(rpc); } }
10 Timetable Feb 97 Project started April 97 DCE IDL to Java Mapping; Demo application July 97 IDL-to-Java compiler; marshalling classes Oct 97 Initial pure Java runtime components Jan 98 Project Ends
11 Current Sponsors Digital DASCOM Chisholm Technologies CIC (The Big Ten + Univ. of Chicago)
12 ActiveX The ACD (ActiveX Core Technologies and DCE) A future technology base for the RI
13 Goals Provide reference implementations of ActiveX Core technology on Unix systems Ensure that ActiveX clients on Unix or Windows systems can securely interact with ActiveX servers on either system Integrate DCE security with ActiveX
14 Deliverables A reference implementation on Unix on top of an extended DCE RPC runtime. Needs full DCE client runtime. Will support both DCOM and DCE clients & servers. A second implementation built on top of MS RPC for clients that do not have a DCE runtime.
15 ActiveX Core Technologies Monikers Automation Structured Storage Data Transfer DCOM Object Management NTLM Registry S C M MSRPC runtime S S P I
16 Integrating DCOM with DCE Security MIDL Compiler DCE IDL Compiler MIDL stubs DCE stubs NTLM SSP DCE SSP MIDL Marshalling engine DCE Marshalling engine DCE RPC RUNTIME S S P I Registry CDS NT Domain Controller DCE Security Server
17 ActiveX Deliverables First half 1997 Ports of ActiveX to 17+ Unix platforms Sub goals: DCE security available via SSPI DCE security in MS RPC; interoperate with DCE secure RPC Second half 1997 Port ActiveX code base to DCE RPC Add NTLM (NT LAN Manager) as a DCE security service
18 ActiveX Participants Microsoft provided base code and specs. Four companies are working on the first release: Digital Equipment Software AG SNI Open Group The Active Group is forming
19 ActiveX Availability Open Group ships source Vendors will ship binaries only. Must be compliant before shipping. $0 client licenses: ActiveX is integrated into NT and Win 95. All vendor bug fixes go back into Open Group source.
Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Middleware. Chapter 8: Middleware
Middleware 1 Middleware Lehrstuhl für Informatik 4 Middleware: Realisation of distributed accesses by suitable software infrastructure Hiding the complexity of the distributed system from the programmer
More informationMiddleware Lou Somers
Middleware Lou Somers April 18, 2002 1 Contents Overview Definition, goals, requirements Four categories of middleware Transactional, message oriented, procedural, object Middleware examples XML-RPC, SOAP,
More informationUnderstanding MAPI. Julien Kerihuel, <j.kerihuel@openchange.org>
Understanding MAPI Julien Kerihuel, Contents Introduction MAPI Overview MAPI Concepts Introduction Introduction This introduction provides a quick overview of the underlying
More informationCOM+ OVERVIEW OF MICROSOFTS COM, DCOM AND COM+ COMPONENT TECHNOLOGIES DCOM - COM+ Peter R. Egli INDIGOO.COM. indigoo.com. 1/20 Rev. 1.
COM, DCOM - COM+ DCOM, COM+ OVERVIEW OF MICROSOFTS COM, DCOM AND COM+ COMPONENT TECHNOLOGIES Peter R. Egli INDIGOO.COM 1/20 Contents 1. Evolution of COM 2. COM, DCOM, ActiveX, OLE, COM+ 3. Structure of
More informationInfrastructure that supports (distributed) componentbased application development
Middleware Technologies 1 What is Middleware? Infrastructure that supports (distributed) componentbased application development a.k.a. distributed component platforms mechanisms to enable component communication
More informationElements of Advanced Java Programming
Appendix A Elements of Advanced Java Programming Objectives At the end of this appendix, you should be able to: Understand two-tier and three-tier architectures for distributed computing Understand the
More informationWhat is COM/DCOM. Distributed Object Systems 4 COM/DCOM. COM vs Corba 1. COM vs. Corba 2. Multiple inheritance vs multiple interfaces
Distributed Object Systems 4 COM/DCOM Piet van Oostrum Sept 18, 2008 What is COM/DCOM Component Object Model Components (distributed objects) à la Microsoft Mainly on Windows platforms Is used in large
More informationWEB SERVICES. Revised 9/29/2015
WEB SERVICES Revised 9/29/2015 This Page Intentionally Left Blank Table of Contents Web Services using WebLogic... 1 Developing Web Services on WebSphere... 2 Developing RESTful Services in Java v1.1...
More informationITS. Java WebService. ITS Data-Solutions Pvt Ltd BENEFITS OF ATTENDANCE:
Java WebService BENEFITS OF ATTENDANCE: PREREQUISITES: Upon completion of this course, students will be able to: Describe the interoperable web services architecture, including the roles of SOAP and WSDL.
More informationDeveloping Java Web Services
Page 1 of 5 Developing Java Web Services Hands On 35 Hours Online 5 Days In-Classroom A comprehensive look at the state of the art in developing interoperable web services on the Java EE platform. Students
More informationWhat is Middleware? Software that functions as a conversion or translation layer. It is also a consolidator and integrator.
What is Middleware? Application Application Middleware Middleware Operating System Operating System Software that functions as a conversion or translation layer. It is also a consolidator and integrator.
More informationOutline SOA. Properties of SOA. Service 2/19/2016. Definitions. Comparison of component technologies. Definitions Component technologies
Szolgáltatásorientált rendszerintegráció Comparison of component technologies Simon Balázs, BME IIT Outline Definitions Component technologies RPC, RMI, CORBA, COM+,.NET, Java, OSGi, EJB, SOAP web services,
More informationIBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide
IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices
More informationModule 17. Client-Server Software Development. Version 2 CSE IIT, Kharagpur
Module 17 Client-Server Software Development Lesson 42 CORBA and COM/DCOM Specific Instructional Objectives At the end of this lesson the student would be able to: Explain what Common Object Request Broker
More informationHow to Configure Informix Connect and ODBC
Informix User Forum 2005 Moving Forward With Informix How to Configure Informix Connect and ODBC James Edmiston Informix DBA Consultant Quest Information Systems, Inc. Atlanta, Georgia December 8-9, 2005
More informationCreating Web Services in NetBeans
Creating Web Services in NetBeans Fulvio Frati fulvio.frati@unimi.it Sesar Lab http://ra.crema.unimi.it 1 Outline Web Services Overview Creation of a Web Services Server Creation of different Web Services
More informationIntroduction CORBA Distributed COM. Sections 9.1 & 9.2. Corba & DCOM. John P. Daigle. Department of Computer Science Georgia State University
Sections 9.1 & 9.2 Corba & DCOM John P. Daigle Department of Computer Science Georgia State University 05.16.06 Outline 1 Introduction 2 CORBA Overview Communication Processes Naming Other Design Concerns
More informationInvocación remota (based on M. L. Liu Distributed Computing -- Concepts and Application http://www.csc.calpoly.edu/~mliu/book/index.
Departament d Arquitectura de Computadors Invocación remota (based on M. L. Liu Distributed Computing -- Concepts and Application http://www.csc.calpoly.edu/~mliu/book/index.html) Local Objects vs. Distributed
More informationFrameworks For Component-Based Client/Server Computing
Frameworks For Component-Based Client/Server Computing Scott M. Lewandowski Department of Computer Science Brown University Providence, RI 02912-1910 scl@cs.brown.edu Abstract This paper presents two frameworks
More information.NET Overview. Andreas Schabus Academic Relations Microsoft Österreich GmbH andreas.schabus@microsoft.com http://blogs.msdn.
Based on Slides by Prof. Dr. H. Mössenböck University of Linz, Institute for System Software, 2004 published under the Microsoft Curriculum License.NET Overview Andreas Schabus Academic Relations Microsoft
More informationJava Web Services Training
Java Web Services Training Duration: 5 days Class Overview A comprehensive look at the state of the art in developing interoperable web services on the Java EE 6 platform. Students learn the key standards
More informationThe Microsoft Way: COM, OLE/ActiveX, COM+ and.net CLR. Chapter 15
The Microsoft Way: COM, OLE/ActiveX, COM+ and.net CLR Chapter 15 Microsoft is continually reengineering its existing application and platform base. Started with VBX, continued with OLE, ODBC, ActiveX,
More informationGet Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Exam : 920-440 Title : nncde wireless lan Version : DEMO 1. A customer wants to access the Microsoft Outlook Web Access application through
More informationLatte Rapid Application Development. William Dunlap Product Manager Borland International wdunlap@wpo.borland.com
Latte Rapid Application Development William Dunlap Product Manager Borland International wdunlap@wpo.borland.com Business Computing Evolution C/S Application Development Collaborative App Development Web
More informationIntel NetMerge Call Processing Software Introduction
Intel NetMerge Call Processing Software Introduction Order Number: 05-0414-007 Software/Version: Intel NetMerge Call Processing Software Version 6.0 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION
More informationChapter 2: Remote Procedure Call (RPC)
Chapter 2: Remote Procedure Call (RPC) Gustavo Alonso Computer Science Department Swiss Federal Institute of Technology (ETHZ) alonso@inf.ethz.ch http://www.iks.inf.ethz.ch/ Contents - Chapter 2 - RPC
More informationJVA-561. Developing SOAP Web Services in Java
JVA-561. Developing SOAP Web Services in Java Version 2.2 A comprehensive look at the state of the art in developing interoperable web services on the Java EE 6 platform. Students learn the key standards
More informationOverview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security
Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security Ch 7 - Security 1 Confidentiality and privacy: Protect
More informationJava-technology based projects
Java-technology based projects TietoEnator Corporation Oyj Simo Vuorinen simo.vuorinen@tietoenator.com 1 TietoEnator 2000 Agenda Java: language, architecture, platform? Javan promises and problems Enterprise-APIs
More informationFrameworks for Component-Based Client/Server Computing
Frameworks for Component-Based Client/Server Computing SCOTT M. LEWANDOWSKI Department of Computer Science, Brown University, Providence, RI 02912-1910 scl@cs.brown.edu 1. INTRODUCTION This article introduces
More informationANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
More informationWindows 2000 Security Architecture. Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation
Windows 2000 Security Architecture Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation Topics Single Sign-on Kerberos v5 integration Active Directory security Delegation of authentication
More informationThe Advantages of Block-Based Protocol Analysis for Security Testing
The Advantages of Block-Based Protocol Analysis for Security Testing Dave Aitel Immunity,Inc. 111 E. 7 th St. Suite 64, NY NY 10009, USA dave@immunitysec.com February, 4 2002 Abstract. This paper describes
More informationInstallation Guide for the Intel Server Control
Installation Guide for the Intel Server Control Order Number: 747116-007 This guide explains how to install and launch the Intel Server Control (ISC) software. ISC is a server management tool that provides
More informationHOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS
HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS Overview of Oracle JInitiator Oracle JInitiator enables users to run Oracle Forms applications using Netscape Navigator or Internet Explorer. It
More informationArchitecture of a Distributed Object Firewall Proxy. Abstract
NAI Labs #0768 Architecture of a Distributed Object Firewall Proxy July 16, 2000 Gary Lamperillo Gary_Lamperillo@NAI.com NAI Labs - The Security Research Division Network Associates 3415 S. Sepulveda Blvd.
More informationApplication of Java and CORBA to Distributed Control and Monitoring Applications in the PHENIX Online Control System
Application of Java and CORBA to Distributed Control and Monitoring Applications in the PHENIX Online Control System E. Desmond 1, S. Adler 1, Lars Ewell 1, J. Haggerty 1, Hyon Joo Kehayias 1, S. Pate
More informationUsing mobile phones to access Web Services in a secure way. Dan Marinescu
Using mobile phones to access Web Services in a secure way Dan Marinescu March 7, 2007 Abstract Web Services is a technology that has gained in acceptance and popularity over the past years. The promise
More informationPROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES
M-FILES CORPORATION PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES VERSION 8 24 SEPTEMBER 2014 Page 1 of 8 CONTENTS 1. Overview... 3 2. Encryption of Data in Transit in M-Files... 4 HTTPS... 4 RPC
More informationLecture 7: Java RMI. CS178: Programming Parallel and Distributed Systems. February 14, 2001 Steven P. Reiss
Lecture 7: Java RMI CS178: Programming Parallel and Distributed Systems February 14, 2001 Steven P. Reiss I. Overview A. Last time we started looking at multiple process programming 1. How to do interprocess
More informationActive Directory Integration with Blue Coat
The Web Security Authority. TM Active Directory Integration with Blue Coat NOTE: This techbrief is applicable when using NTLM under Windows 2000 Server. Introduction Windows 2000 server utilizes Active
More informationSocket = an interface connection between two (dissimilar) pipes. OS provides this API to connect applications to networks. home.comcast.
Interprocess communication (Part 2) For an application to send something out as a message, it must arrange its OS to receive its input. The OS is then sends it out either as a UDP datagram on the transport
More informationFingerprinting Through RPC
Fingerprinting Through RPC Hidenobu Seki Urity@SecurityFriday.com Agenda Information gathering for RPC troubleshooting Microsoft RPC Interface IDs of Windows RPC services Info gathering without authentication
More informationHewlett Packard. PRODUCT NAME: HP Distributed Computing Environment SPD 43.05.11 (DCE) Version 3.2 for OpenVMS Systems
Hewlett Packard Software Product Description PRODUCT NAME: HP Distributed Computing Environment SPD 43.05.11 (DCE) Version 3.2 for OpenVMS Systems DESCRIPTION The HP Distributed Computing Environment for
More informationIBM Software Group. Lotus Domino 6.5 Server Enablement
IBM Software Group Lotus Domino 6.5 Server Enablement Agenda Delivery Strategy Themes Domino 6.5 Server Domino 6.0 SmartUpgrade Questions IBM Lotus Notes/Domino Delivery Strategy 6.0.x MRs every 4 months
More informationChapter 17 Determining Windows 2000 Network Security Strategies
625 CHAPTER 17 Determining Windows 2000 Network Security Strategies Today, most organizations want their computer infrastructure connected to the Internet because it provides valuable services to their
More informationAsk a network designer what middleware
DISTRIBUTED COMPUTING Managing Complexity: Middleware Explained Andrew T. Campbell, Geoff Coulson, and Michael E. Kounavis Ask a network designer what middleware is, and he ll characterize it as part of
More informationMiddleware: Past and Present a Comparison
Middleware: Past and Present a Comparison Hennadiy Pinus ABSTRACT The construction of distributed systems is a difficult task for programmers, which can be simplified with the use of middleware. Middleware
More informationActive Directory network protocols and traffic
HERVÉ SCHAUER CONSULTANTS Cabinet de Consultants en Sécurité Informatique depuis 1989 Spécialisé sur Unix, Windows, TCP/IP et Internet Windows Security OSSIR group 13th September S 2004 Active Directory
More informationDCOM & Control List Genetec Information Systems Page i Win2003 Service Pack 1
Windows 2003 SP1 configuration DCOM & Control List Genetec Information Systems Page i Win2003 Service Pack 1 Table of Contents 1 INTRODUCTION...1 1.1 NETWORK CHANGES IN WINDOWS 2003 SERVER SP1...3 1.1.1
More informationCitrix XenApp 6.5 and XenDesktop 5.6 Security Standards and Deployment Scenarios Supplementary scenarios
Citrix XenApp 6.5 and XenDesktop 5.6 Security Standards and Deployment Scenarios Supplementary scenarios Overview Citrix products offer the security specialist a wide range of features for securing Citrix
More informationTG Web. Technical FAQ
TG Web Technical FAQ About this FAQ We encourage you to contact us if. You can't find the information you're looking for. You would like to discuss your specific testing requirements in more detail. You
More informationAgent Languages. Overview. Requirements. Java. Tcl/Tk. Telescript. Evaluation. Artificial Intelligence Intelligent Agents
Agent Languages Requirements Overview Java Tcl/Tk Telescript Evaluation Franz J. Kurfess, Cal Poly SLO 211 Requirements for agent Languages distributed programming large-scale (tens of thousands of computers)
More informationA Flexible Security Architecture for the EJB Framework
A Flexible Security Architecture for the EJB Framework Frank Kohmann¹, Michael Weber², Achim Botz¹ ¹ TPS Labs AG, Balanstr 49, D-81541 München {frank.kohmann achim.botz}@tps-labs.com ² Abteilung Verteilte
More informationBMC Performance Manager Windows Security White Paper DCOM / WMI
BMC Performance Manager Windows Security White Paper DCOM / WMI Problem The IT department delivers user IT services to their internal and external customers. The IT department wants to maintain control
More information[MS-SSP]: Intellectual Property Rights Notice for Open Specifications Documentation
[MS-SSP]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,
More informationOverview of Web Services API
1 CHAPTER The Cisco IP Interoperability and Collaboration System (IPICS) 4.5(x) application programming interface (API) provides a web services-based API that enables the management and control of various
More informationRequirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module
Collax SSL VPN Howto This howto describes the easy configuration of a Collax server as SSL VPN gateway in order to enable external access to selected applications in the company network. Except for a common
More informationWeb. Security Options Comparison
Web 3 Security Options Comparison Windows Server 2003 provides a number of Security Options that can be applied within the scope of managing a GPO. Most are the same as those available in Windows 2000.
More informationMSRPC NULL sessions. Exploitation and protection. Jean-Baptiste Marchand <Jean-Baptiste.Marchand@hsc.fr>
MSRPC NULL sessions Exploitation and protection Jean-Baptiste Marchand Jean-Baptiste Marchand Agenda - 2 - Introduction to NULL sessions NULL sessions internals Tools to
More informationProject Title: Judicial Branch Enterprise Document Management System RFP Number: FIN122210CK DMS TECHNICAL REQUIREMENTS
APPENDIX C. DMS TECHNICAL REQUIREMENTS C.1 INTRODUCTION This appendix is an overview of the California Judicial Branch infrastructure and technical requirements considerations that require a written response.
More informationMotivation Definitions EAI Architectures Elements Integration Technologies. Part I. EAI: Foundations, Concepts, and Architectures
Part I EAI: Foundations, Concepts, and Architectures 5 Example: Mail-order Company Mail order Company IS Invoicing Windows, standard software IS Order Processing Linux, C++, Oracle IS Accounts Receivable
More informationOpenChange 2.0. Ecosystem. May, 15 17 th 2013 SambaXP Conference. Julien Kerihuel <j.kerihuel@openchange.org>
OpenChange 2.0 Ecosystem May, 15 17 th 2013 SambaXP Conference Julien Kerihuel About Myself 2 of 28 About Myself Founder and lead developer of OpenChange 2003: The idea 2004:
More informationUsing LifeSize Systems with Microsoft Office Communications Server 2007
Using LifeSize Systems with Microsoft Office Communications Server 2007 This technical note describes the steps to integrate a LifeSize video communications device with Microsoft Office Communication Server
More informationSecurity Options... 1
Effective Server Security Options Period: Last 20 week(s) Generated: For: Brian Bartlett bbartlett@ecora.com By: Ecora Auditor Professional 4.5 - Windows Module 4.5.8010.20310 Using: Customized FFR Definition
More informationCopyright 2014 http://itfreetraining.com
This video will look the different versions of Active Directory Federation Services. This includes which features are available in each one and which operating system you need in order to use these features.
More informationReport of the case study in Sistemi Distribuiti A simple Java RMI application
Report of the case study in Sistemi Distribuiti A simple Java RMI application Academic year 2012/13 Vessio Gennaro Marzulli Giovanni Abstract In the ambit of distributed systems a key-role is played by
More informationSpine Warranted Environment Specification
Spine Warranted Environment Specification 2015 Richard Trusson June 2015 1 Copyright 2015, Health and Social Care Information Centre. Contents Introduction 3 Scope 3 Intended Audience 4 Approach 4 Changes
More informationExpanding the Value of the Windows Terminal Server Investment. HOBLink JWT HOB Enhanced Terminal Services
Expanding the Value of the Windows Terminal Server Investment HOBLink JWT HOB Enhanced Terminal Services 2001 by HOB electronic GmbH & Co. KG Information in this document is subject to change without notice,
More informationLesson 4 Web Service Interface Definition (Part I)
Lesson 4 Web Service Interface Definition (Part I) Service Oriented Architectures Module 1 - Basic technologies Unit 3 WSDL Ernesto Damiani Università di Milano Interface Definition Languages (1) IDLs
More informationz/os Firewall Technology Overview
z/os Firewall Technology Overview Mary Sweat E - Mail: sweatm@us.ibm.com Washington System Center OS/390 Firewall/VPN 1 Firewall Technologies Tools Included with the OS/390 Security Server Configuration
More informationH2O A Lightweight Approach to Grid Computing
H2O A Lightweight Approach to Grid Computing Roberto Podesta ropode@dist.unige.it References Emory University (Atlanta, GA, USA) Distributed Computing Laboratory Director: Prof. Vaidy Sunderam Project
More informationIntroduction to CORBA. 1. Introduction 2. Distributed Systems: Notions 3. Middleware 4. CORBA Architecture
Introduction to CORBA 1. Introduction 2. Distributed Systems: Notions 3. Middleware 4. CORBA Architecture 1. Introduction CORBA is defined by the OMG The OMG: -Founded in 1989 by eight companies as a non-profit
More informationCitrix Password Manager Using the Account Self-Service Feature. Citrix Password Manager 4.6 with Service Pack 1 Citrix XenApp 5.0, Platinum Edition
Citrix Password Manager Using the Account Self-Service Feature Citrix Password Manager 4.6 with Service Pack 1 Citrix XenApp 5.0, Platinum Edition 2 Citrix Password Manager - Account Self-Service Copyright
More informationJAVA API FOR XML WEB SERVICES (JAX-WS)
JAVA API FOR XML WEB SERVICES (JAX-WS) INTRODUCTION AND PURPOSE The Java API for XML Web Services (JAX-WS) is a Java programming language API for creating web services. JAX-WS 2.0 replaced the JAX-RPC
More informationIBM TRAINING L13. Replacing Windows Servers with Linux. Mark Post. Orlando, FL. 2004-2006 Mark Post
IBM TRAINING L13 Replacing Windows Servers with Linux Mark Post Orlando, FL 2004-2006 Mark Post Agenda Reasons to move away from Microsoft Windows What Windows functions can be replaced? What can replace
More informationIntegration of Nagios monitoring tools with IBM's solutions
Integration of Nagios monitoring tools with IBM's solutions Wojciech Kocjan IBM Corporation wojciech.kocjan@pl.ibm.com 1 Agenda Introduction Integration bottlenecks Why open standards? CIM and WBEM Open
More informationMiddleware and Distributed Systems. Introduction. Dr. Martin v. Löwis
Middleware and Distributed Systems Introduction Dr. Martin v. Löwis 14 3. Software Engineering What is Middleware? Bauer et al. Software Engineering, Report on a conference sponsored by the NATO SCIENCE
More informationComparing Web service development with J2EE and Microsoft.NET
Comparing Web service development with J2EE and Microsoft.NET Pirjo Prosi Vaasa Polytechnic Kimmo Salmenjoki University of Vaasa Contents 1. Introduction 2. The main technologies of web services 3. Implementing
More informationContracts for Services: Needs and Nonsense!
Contracts for Services: Needs and Nonsense! Mark Perreira, Chief Scientist Talking Blocks Slide 1 Agenda Web services and WSDL, today. Defining a contract-based system. The architecture and benefits of
More informationSingle Sign On In A CORBA-Based
Single Sign On In A CORBA-Based Based Distributed System Igor Balabine IONA Security Architect Outline A standards-based framework approach to the Enterprise application security Security framework example:
More informationComodo Certificate Manager Version 5.4
Comodo Certificate Manager Version 5.4 Comodo Certificate Authority Proxy Server Architectural Overview Guide Version 5.4.031816 Comodo CA Limited 3rd Floor, 26 Office Village, Exchange Quay, Trafford
More informationINNOV-04 The SANS Top 20 Internet Security Vulnerabilities
INNOV-04 The SANS Top 20 Internet Security Vulnerabilities (and what it means to OpenEdge Applications) Michael Solomon, CISSP PMP CISM Solomon Consulting Inc. www.solomonconsulting.com (Thanks to John
More informationJava and Distributed Object Models: An Analysis
Abstract Java and Distributed Object Models: An Analysis Marjan Hericko *, Matjaz B. Juric *, Ales Zivkovic *, Ivan Rozman *, Tomaz Domajnko *, Marjan Krisper ** * University of Maribor, Faculty of Electrical
More informationNetwork operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation.
NETWORK OPERATING SYSTEM Introduction Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation. Network operating
More informationWindows network services internals HiverCon 2003
Windows network services internals HiverCon 2003 Jean-Baptiste Marchand Jean-Baptiste Marchand Agenda TCP/IP stack SMB/CIFS MSRPC References 2 / 92 Copyright Hervé Jean-Baptiste
More informationInterface Definition Language
Interface Definition Language A. David McKinnon Washington State University An Interface Definition Language (IDL) is a language that is used to define the interface between a client and server process
More informationLatitude NVMS Windows XP SP2 Configuration
Latitude NVMS Windows XP SP2 Configuration Table of Contents 1 INTRODUCTION...1 1.1 NETWORK CHANGES IN WINDOWS XP SERVICE PACK 2...1 1.1.1 DCOM Security...1 1.1.2 Windows Firewall...2 2 EFFECT OF WINDOWS
More informationLayering a computing infrastructure. Middleware. The new infrastructure: middleware. Spanning layer. Middleware objectives. The new infrastructure
University of California at Berkeley School of Information Management and Systems Information Systems 206 Distributed Computing Applications and Infrastructure Layering a computing infrastructure Middleware
More informationIBM Security QRadar Vulnerability Manager Version 7.2.6. User Guide IBM
IBM Security QRadar Vulnerability Manager Version 7.2.6 User Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 91. Product information
More informationWhat Is the Java TM 2 Platform, Enterprise Edition?
Page 1 de 9 What Is the Java TM 2 Platform, Enterprise Edition? This document provides an introduction to the features and benefits of the Java 2 platform, Enterprise Edition. Overview Enterprises today
More informationIntegrating Siebel CRM with Microsoft SharePoint Server
Integrating Siebel CRM with Microsoft SharePoint Server www.sierraatlantic.com Headquarters 6522 Kaiser Drive, Fremont CA 94555, USA Phone: 1.510.742.4100 Fax: 1.510.742.4101 Global Development Center
More informationNessus scanning on Windows Domain
Nessus scanning on Windows Domain A little inside information and Nessus can go a long way By Sunil Vakharia sunilv@phreaker.net Version 1.0 4 November 2003 About this paper This paper is not a tutorial
More informationA Java proxy for MS SQL Server Reporting Services
1 of 5 1/10/2005 9:37 PM Advertisement: Support JavaWorld, click here! January 2005 HOME FEATURED TUTORIALS COLUMNS NEWS & REVIEWS FORUM JW RESOURCES ABOUT JW A Java proxy for MS SQL Server Reporting Services
More informationE-Commerce Systems Technology Infrastructure
6 E-Commerce Systems Technology Infrastructure Earlier chapters discussed vital components of e-commerce systems. This chapter introduces the readers to ancillary technology elements that an organization
More informationOracle Net Services for Oracle10g. An Oracle White Paper May 2005
Oracle Net Services for Oracle10g An Oracle White Paper May 2005 Oracle Net Services INTRODUCTION Oracle Database 10g is the first database designed for enterprise grid computing, the most flexible and
More informationAuthor: Gennaro Frazzingaro Universidad Rey Juan Carlos campus de Mostòles (Madrid) GIA Grupo de Inteligencia Artificial
Simple Implementation of a WebService using Eclipse Author: Gennaro Frazzingaro Universidad Rey Juan Carlos campus de Mostòles (Madrid) GIA Grupo de Inteligencia Artificial Contents Web Services introduction
More informationWindows network services for Samba folks
Windows network services for Samba folks Jean-Baptiste Marchand Hervé Schauer Consultants 1 Agenda SMB/CIFS implementation MSRPC implementation Network authentication Interesting tools References
More informationQuickSpecs. QuickSpecs. Description. HP OpenVMS Application Modernization and Integration Infrastructure Package,Version 2.3
Description The Infrastructure Package provides Internet, e-business, and integration software technology that enhances the OpenVMS Alpha and I64 operating systems, enabling the development of e-business
More information