[Next]
[Up]
[Previous]
[Contents]
Next:
4.2.1 How does CORBA
Up:
4. CORBASEC specification
Previous:
4.1.32 How are privacy
4
.
2
Application developer
4
.
2
.
1
How does CORBA security affect application writers?
4
.
2
.
2
Do we need to pass the UserId as a parameter or there is some other way of getting it?
4
.
2
.
3
How would one incorporate security into an ORB system in the next 6 months, so that the solution would not be obsoleted in the following 6?
4
.
2
.
4
Does CORBA security guarantee that the request and reply are not tampered and not intercepted on their way between the client and the target?
4
.
2
.
5
Is it necessary to secure naming service?
4
.
2
.
6
[IMAGE ]How to come up with application security design using CORBA Security service?
4
.
2
.
7
[IMAGE ]How does a security-aware application specify the use of a specific algorithms for supporting communication confidentiality and integrity?
4
.
2
.
8
What is available in CORBASEC for strong (writer-to-reader) authentication?