Basic HTML version of Foils prepared
June 5 99
Foil 73 Privilege Delegation
From
Use of Java in Computational Science DoD Modernization Users Group Conference Monterey --
June 7 99
.
by
Tom Haupt,Geoffrey C. Fox
1
No delegation
The intermediary uses its own credentials
2
Simple delegation
The intermediary impersonates the client
3
Composite delegation
The intermediary uses both
4
Client
5
Target
6
Client
7
Target
8
Client
9
Target
10
Client
11
Target
12
Object
13
IIOP
in Table To:
©
Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu
If you have any comments about this server, send e-mail to
webmaster@npac.syr.edu
.
Page produced by
wwwfoil
on Tue Jul 6 1999