Next:
4.1.1 Where can I
Up:
4. CORBASEC specification
Previous:
4. CORBASEC specification
4
.
1
General
4
.
1
.
1
Where can I get the official specification of CORBASEC?
4
.
1
.
2
Where can I get IDL code of CORBASEC interfaces?
4
.
1
.
3
What is the current version of CORBASEC official specification?
4
.
1
.
4
Are there any upcoming updates of the specification?
4
.
1
.
5
Who is responsible for producing specification updates?
4
.
1
.
6
Are there any upcoming new releases of the specifications?
4
.
1
.
7
Who is responsible for producing new specification releases?
4
.
1
.
8
Where can I find a list of outstanding issues in CORBASEC specification?
4
.
1
.
9
I found a typo in the specification, where can I submit it?
4
.
1
.
10
Is there a set of UML diagrams for the CORBASEC Specification?
4
.
1
.
11
I found an error in the specification, where can I submit it?
4
.
1
.
12
I have an idea how to ``improve'' the specification, where can I propose it?
4
.
1
.
13
What are the shortcomings of CORBA Security service?
4
.
1
.
14
Is it completely true that the CORBA Security service is a direct lift of DCE Security?
4
.
1
.
15
What is "Principal", and what is meant by "Principal authentication"?
4
.
1
.
16
What are credentials?
4
.
1
.
17
How are attributes used?
4
.
1
.
18
What does it mean to be conformant to CORBA Security specification?
Security functionality options
Security Replaceability
Secure interoperability
4
.
1
.
19
What about conformance to the Common Secure Interoperability specification?
4
.
1
.
20
What are the protocols used by CSI?
4
.
1
.
21
What about CSI with SSL?
4
.
1
.
22
What is a "Session"?
4
.
1
.
23
How does security context get established between client and server?
4
.
1
.
24
Is there somewhere a description of the context management?
4
.
1
.
25
What is the validity of a context?
4
.
1
.
26
Does a new context for a target have be established if a client is accessing a new target on the same server?
4
.
1
.
27
Will the current context be valid for all requests of the client (and all replies of the server) till the client decides that the context is not valid anymore?
4
.
1
.
28
Which instance manages the contexts?
4
.
1
.
29
Which instance decides that now, the "Session" is over, and the context can be deleted?
4
.
1
.
30
Are the any interfaces specified in CORBASEC for controlling security context by security-aware applications?
4
.
1
.
31
How is access controlled?
4
.
1
.
32
How are privacy and non-repudiation addressed by CORBASEC?