java rmi
Recently Published Documents


TOTAL DOCUMENTS

63
(FIVE YEARS 0)

H-INDEX

8
(FIVE YEARS 0)

2020 ◽  
Vol 9 (1) ◽  
pp. 113
Author(s):  
Amira B. Sallow

Networks of computers are everywhere. The Internet is one, as are the many networks of which it is composed. Mobile phone networks, corporate networks, factory networks, campus networks, home networks, in-car networks, both separately and in combination, all share the essential characteristics that make them relevant subjects for study under the heading distributed systems. Most organizations use a wide variety of applications for the smooth functioning of their businesses that includes homogenous as well as heterogeneous systems. Heterogeneous systems run on different platforms, use different technologies or sometimes even run on a different network architecture altogether. The essential role of Middleware is to provide a simple environment to manage complex, heterogeneous and distributed infrastructures. The main goal of this paper is to use Java-RMI middleware to build a distributed system for scheduling the threads. The system comprises two separate programs, a server, and a client. A typical server program creates some remote objects, makes references to these objects accessible, and waits for clients to invoke methods on these objects. A typical client program obtains a remote reference to one or more remote objects on a server and then invokes methods on them.







Author(s):  
Michael Adeyeye Oshin ◽  
Matthew Olusegun Ojewale ◽  
Oluyomi Olufemi Kabiawu ◽  
Romana Challans ◽  
Kauna Mufeti

Service availability in Java RMI (Remote Method Invocation) implementations can easily be compromised in a number of ways. One of the ways is when an attacker controls a directory service and mounts an attack on a RMI client and data. Stubs in a registry can be de- registered or overwritten by the attacker. In addition, he could register his own stubs as proxies to a server implementation. This project focuses on the security pitfalls of using default RMI implementation, namely the lack of access control mechanism to manage server methods (and objects) and limitations of RMI registry. The RMI registry is a weak point that could be exploited. This work addresses this concern by investigating RMI implementation and customizing the behavior to support client/method authorization, authentication and elimination of the need for an RMI registry. The contribution of this work is that it removes inherent vulnerability in RMI, which is due to weak security in RMI registry implementation. In addition, an emerging toolkit, Haxe, for platform-agnostic application development was introduced and its realization of RMI was briefly demonstrated. Haxe exhibits virtually all the features in Java and could be exploited like it. It however presents more promising features for the next generation of applications and services.



Author(s):  
Oum El Kheir Naoui ◽  
Ghalem Belalem ◽  
Saïd Mahmoudi

In this paper, the authors propose a distributed schema applied to implement the standard version of the Active Appearance Model (AAM) segmentation approach such as designed by Cootes et al.(1995) (1998). The scheme is intended to be implemented by exploiting the object-oriented software based on remote method invocation as Java-RMI. Implementation is in progress and it is realized step by step.



2012 ◽  
Vol 7 (2) ◽  
pp. 132
Author(s):  
Adi Nugroho ◽  
Ahmad Ashari

DCOM, CORBA, dan Java RMI adalah middleware yang memungkinkan komputasi jarak jauh atau komputasi tersebar. Meskipun telah terdapat konsep layanan web dan implementasi yang diterapkan dalam berbagai kasus saat ini, ketiga middleware di atas masih sering digunakan untuk lingkungan yang application-specific, yang membutuhkan performa lebih baik. Paper ini diharapkan akan memberikan gambaran mengenai DCOM, CORBA, dan Java RMI dari konsep hingga perbedaan yang paling mendasar terkait teknik pemrograman. DCOM, CORBA, and Java RMI are middleware that enable remote computing (distributed computing). Although we have Web Service concept and implementation that applied in many cases right now, all three still often used for applications-specific nature, which need the better performance. This paper is intended to give an overview of DCOM, CORBA, and Java RMI, from concept to most fundamental differences related to programming techniques.



2012 ◽  
pp. 419-435
Author(s):  
Fredrik Paulsson ◽  
Mikael Berglund

A general SOA framework for Virtual Learning Environments, based on the VWE Learning Object Taxonomy, is suggested in this chapter. Five basic and general services are suggested for implementation of modular Virtual Learning Environments. The design of the service framework was tested by implementation in two prototypes, using two different approaches where a Java-RMI based implementation was compared to a Web Service (SOAP) based implementation. By implementing the VWE Learning Object Taxonomy and the VWE SOA framework, the prototypes showed that a level of modularity, similar to the level of modularity of Learning Objects, could be achieved for the Virtual Learning Environment as well. Using the VWE Learning Object Taxonomy, this was accomplished by including the learning content and the Virtual Learning Environment into the same conceptual space. The comparison of the prototypes showed that the Web Service approach was preferred in favor of the Java-RMI approach. This was mainly due to platform neutrality and the use of the http-protocol. The study was supplemented by an analysis of the two approaches in relation to a third, REST-based approach.



Author(s):  
Christian Werner ◽  
Carsten Buschmann ◽  
Ylva Brandt ◽  
Stefan Fischer

A major drawback of using SOAP for application integration is its enormous demand for network bandwidth. Compared to classical approaches like Java-RMI and Corba, SOAP messages typically cause more than three times more network traffic. In this chapter we will explore compression strategies and give a detailed survey and evaluation of state-of-the-art binary encoding techniques for SOAP. We also introduce a new experimental concept for SOAP compression based on differential encoding, which makes use of the commonly available WSDL description of a SOAP Web service. We not only conduct a detailed evaluation of compression effectiveness, but also provide the results of execution time measurements.



Author(s):  
Christian Werner ◽  
Carsten Buschmann ◽  
Stefan Fischer

A major drawback of using SOAP for application integration is its enormous demand for network bandwidth. Compared to classical approaches, like Java-RMI and Corba, SOAP messages typically cause more than three times the network traffic. In this chapter we will explore compression strategies and give a detailed survey and evaluation of state of the art binary encoding techniques for SOAP. We also introduce a new experimental concept for SOAP compression based on differential encoding, which makes use of the commonly available WSDL description of a SOAP Web service. We not only conduct a detailed evaluation of compression effectiveness, but also provide the results of execution time measurements.



Sign in / Sign up

Export Citation Format

Share Document