Securing RMI Communication

  • Vincent Naessens
  • Bart Vanhaute
  • Bart De Decker
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 78)

Abstract

Application programmers often have to protect their applications themselves in order to achieve secure applications. Therefore, they have to possess a lot of knowledge about security related issues. The solution to this problem is to separate the security-related modules as much as possible from the real application and transparently invoke these security modules. By doing this, the application programmer can build his distributed application without considering the security requirements.

The case study presents how to achieve transparent security in the RMI (remote method invocation) system, an API provided by Java to implement applications in a distributed environment. The presented framework is also flexible enough to support different levels of security.

Keywords

open distributed system security framework 

References

  1. 6.
    Erich Gamma, Richard Helm, Ralph Johnson and John Vlissides, ‘Design Patterns, elements of reusable objectoriented software’, Addison-Wesley 1995Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2002

Authors and Affiliations

  • Vincent Naessens
    • 1
  • Bart Vanhaute
    • 2
  • Bart De Decker
    • 2
  1. 1.K. U.LeuvenKulak
  2. 2.Dept. of Computer Science, DistriNetK.U.LeuvenBelgium

Personalised recommendations