DCOM:
• Allows creation of objects distributed across a network
• DCOM provides a protocol for invoking that object’s methods, and secure access to the object
• DCOM provides a wrapper around COM, and hence it is backward compatible
• DCOM uses Remote Procedure Call
• Protocol gets registered just prior to use rather then at initialization
• To convey alive status of client, periodic pinging is used
• In DCOM, multiple QueryInterfaces are all clustered into one call
DCOM Call Security:
• Authentication: Prevent false clients from impersonating the true client
• Authorization: Client’s actions are appropriate
• Data integrity: Ensure data was not tampered during transit
• Data privacy: Ensure only authorized users can access it
No comments:
Post a Comment