[Next]
[Up]
[Previous]
[Contents]
Next:
5.2.1 DAIS Security
Up:
5. CORBASEC implementations
Previous:
5.1.7 [IMAGE ]Are CORBAsec
5
.
2
Particular Implementations
5
.
2
.
1
DAIS Security
5
.
2
.
1
.
1
What is DAIS Security?
5
.
2
.
1
.
2
What is the current version of DAIS Security
5
.
2
.
1
.
3
What is the current status of DAIS Security?
5
.
2
.
1
.
4
Does DAIS conform to CORBASEC specifications?
5
.
2
.
1
.
5
Why did ICL choose the CSI-ECMA security mechanism in its DAIS Security implementation?
5
.
2
.
1
.
6
What features does DAIS Security offer?
5
.
2
.
1
.
7
What is the advantage of using roles in DAIS Security?
5
.
2
.
1
.
8
What are the advantages (and disadvantages) of using public key technology in DAIS Security?
5
.
2
.
1
.
9
What are the advantages (and disadvantages) of using secret key technology (passwords) in DAIS Security?
5
.
2
.
1
.
10
Why have domains in DAIS Security?
5
.
2
.
1
.
11
Why policy domains?
5
.
2
.
1
.
12
Where can find more information on DAIS Security?
5
.
2
.
2
OrbixSecurity
5
.
2
.
2
.
1
[IMAGE ]What is the conformance level of OrbixSecurity?
5
.
2
.
2
.
2
[IMAGE ]Where do I start from in order to use OrbixSecurity?
5
.
2
.
2
.
3
What DCE components are required to use OrbixSecurity?
5
.
2
.
2
.
4
Can a user on a remote machine still run the server and call its methods if he or she changes their username on the remote machine deliberately to match the registered users list?
5
.
2
.
2
.
5
What authentication process is used in OrbixSecurity?
5
.
2
.
2
.
6
How does OrbixSecurity work and how and what component of DCE needs to be installed?
5
.
2
.
2
.
7
[IMAGE ]Can we use Orbix security to provide Access control at Object instance level?
5
.
2
.
2
.
8
Authentication Security Exception