Implementing remote procedure calls
ACM Transactions on Computer Systems (TOCS)
SSL and TLS: designing and building secure systems
SSL and TLS: designing and building secure systems
Java Distributed Object Models: An Alternative to Corba?
IT Professional
Integrating Java and CORBA: A Programmer's Perspective
IEEE Internet Computing
More Efficient Object Serialization
Proceedings of the 11 IPPS/SPDP'99 Workshops Held in Conjunction with the 13th International Parallel Processing Symposium and 10th Symposium on Parallel and Distributed Processing
Transparent Consistent Replication of Java RMI Objects
DOA '00 Proceedings of the International Symposium on Distributed Objects and Applications
Solutions to Make Java-RMI Time Predictable
ISORC '01 Proceedings of the Fourth International Symposium on Object-Oriented Real-Time Distributed Computing
A Security Infrastructure for Distributed Java Applications
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Securing Java RMI-Based Distributed Applications
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
Security Enhancement of Java Remote Method Invocation
DEPCOS-RELCOMEX '06 Proceedings of the International Conference on Dependability of Computer Systems
A distributed object model for the javaTM system
COOTS'96 Proceedings of the 2nd conference on USENIX Conference on Object-Oriented Technologies (COOTS) - Volume 2
Hi-index | 0.00 |
The Java Remote Method Invocation (RMI) is a well-known solution for remote method call. However, the standard Java RMI lacks features like service availability, load sharing, authentication and authorisation of client, data security and asynchronous communication, which are desirable in any enterprise distributed application. To enhance or add any new functionality in the RMI runtime, a detailed study of its internal workings is required. We debug and analyse RMI programs to understand the internal workings of the RMI architecture. We present the components involved and their responsibilities, detailed internal communication process and feasible enhancements at different layers of the RMI architecture. We compare the RMI with other distributed computing technologies like Common Object Request Broker Architecture (CORBA) and web services. We also discuss possible enhancements in the RMI runtime, which could perfect it for a real enterprise application. As a proof of concept, we also discuss the implementation details of providing a client authentication functionality by modifying the RMI runtime. In addition to programmers, this contribution will also help the research community and the RMI runtime providers to enhance the RMI runtime.