Exams

Cluster Computing and Web Security

Home
Exams
Grades

(Take-Home) Final Exam

Please choose four of the following questions to answer:

  1. What EJB brings to distributed applications in terms of programming size and complexity level?
  2. What can you suggest for controlling malicious applet behaviors in a browser?
  3. Explain one of the filtering mechanisms for malicious applets.
  4. What is the functionality of MetaData in distributed applications? Explain how MetaData is used in exploring run-time properties of objects or components?
  5. What advantages of Java is exploited by jmpi in terms of implementation. Explain.
  6. What is meant by Trusted Third Party? Explain the benefits of having such a Trusted Third Party.
  7. What kind of precautions must be taken to support web security?
  8. What is the main problem with component specification in component assembly operation in distributed applications? Explain functionality of contracts.

(Take-Home) Midterm 

Please choose four of the following questions to answer:

  1. Explain the functionality of "communication contexts" in parallel programming. What may happen in case of non-existence of contexts?
  2. Explain main categories of communication features in parallel programming with most important application designs. Discuss advantages and disadvantages. 
  3. Explain the Secure Identity-Based Loading assumptions and limitations shortly. 
  4. Explain how java applets could bypass Security Manager mechanism in Java. Suggest also ways for controlling illegal behaviors of applets.
  5. Explain the El-Gamal Digital Signature Scheme.
  6. Explain the two important aspects of any E-Voting scheme must provide. 
  7. Explain the virtues of the Solar Trust Model. What is provided by this model?
  8. What are the crucial differences between Jini architecture and CORBA from the mobility point of view?
 

Last updated: July 29, 2001 01:23:28 +0300 KD