Skip to Main Content
DCE Replacement Strategies
book

DCE Replacement Strategies

by Heinz Johner, Jakob Erber, Stephen Hawkins, Klaus Mueller, Pallavi Nagesha Rao, Donna Skibbie
June 2003
Intermediate to advanced content levelIntermediate to advanced
454 pages
10h 19m
English
IBM Redbooks
Content preview from DCE Replacement Strategies
Chapter 2. Replacement technologies 39
protocols that enables clients to invoke methods on remote objects. This is done
as follows: the client finds the method using either Java JNDI or CORBA
CosNaming; invokes the method using either Java RMI or CORBA IDL;
serializes, marshals, and transmits the method data using Common Object
Request Broker Architecture over Internet Inter-Orb Protocol (CORBA IIOP);
and, if required, secures the transmission using CORBA CSIv2. The method
data is transmitted in Unicode, so multiple languages are supported.
CSIv2 must be implemented as specified in Conformance Level 0. In this
conformance level, CSIv2 must be able to pass client identity information using
basic authentication (client passes its user identity ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Reinventing the Organization for GenAI and LLMs

Reinventing the Organization for GenAI and LLMs

Ethan Mollick

Publisher Resources

ISBN: 0738453080Purchase book