Securing RMI Communication
Application programmers often have to protect their applications themselves in order to achieve secure applications. Therefore, they have to possess a lot of knowledge about security related issues. The solution to this problem is to separate the security-related modules as much as possible from the real application and transparently invoke these security modules. By doing this, the application programmer can build his distributed application without considering the security requirements.
The case study presents how to achieve transparent security in the RMI (remote method invocation) system, an API provided by Java to implement applications in a distributed environment. The presented framework is also flexible enough to support different levels of security.
Keywordsopen distributed system security framework
- 6.Erich Gamma, Richard Helm, Ralph Johnson and John Vlissides, ‘Design Patterns, elements of reusable objectoriented software’, Addison-Wesley 1995Google Scholar