Font Size: a A A

Based The Jaas Rmi Access Control Mechanism And Realization

Posted on:2008-03-24Degree:MasterType:Thesis
Country:ChinaCandidate:K WangFull Text:PDF
GTID:2208360212474300Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the widely use of RMI,its security problem also becomes more and more serious. Although Sun Corporation is also strengthening its security function, until now the RMI technology still lacked the protection of access control . At present,this flaw has been the bottleneck which hinders the RMI technology's development in Internet and other modern network.The main goal of this thesis is to design and implement JAAS-based RMI Access Control Toolkit. We believe the toolkit can effectively solute the RMI access control problem.According to function division,our Toolkit include authentication module, remote service dispatch module, and right control module.The authentication module is responsible to authenticate the customers'identify;the remote service dispatch module is responsible to return the remote service which is requested by the customer;the access control module is responsible to control the process of customers' remote method invocation according to the right policy.At first, this thesis briefly introduces the RMI technology,and then makes some discussions on the JAAS architecture.Based on these, the design architecture of RMI Access Control Toolkit is presented and the sub-modules are implemented according to the design architecture.After all the modules have been developed,we designed and realized a simple RMI Demo System which is used to test the effect of our RMI Access Control Toolkit.Finally, advantages and disadvantages of this system are summarized, and possible solutions are put forward.
Keywords/Search Tags:RMI, JAAS, identity authenticate, right control
PDF Full Text Request
Related items