(Take-Home) Final Exam
Please choose four of the following questions to answer:
- What EJB brings to distributed applications in terms of programming size
and complexity level?
- What can you suggest for controlling malicious applet behaviors in a
browser?
- Explain one of the filtering mechanisms for malicious applets.
- What is the functionality of MetaData in distributed applications? Explain
how MetaData is used in exploring run-time properties of objects or
components?
- What advantages of Java is exploited by jmpi in terms of implementation.
Explain.
- What is meant by Trusted Third Party? Explain the benefits of having such
a Trusted Third Party.
- What kind of precautions must be taken to support web security?
- What is the main problem with component specification in component
assembly operation in distributed applications? Explain functionality of
contracts.
(Take-Home) Midterm
Please choose four of the following questions to answer:
- Explain the functionality of "communication contexts" in
parallel programming. What may happen in case of non-existence of contexts?
- Explain main categories of communication features in parallel programming
with most important application designs. Discuss advantages and
disadvantages.
- Explain the Secure Identity-Based Loading assumptions and limitations
shortly.
- Explain how java applets could bypass Security Manager mechanism in Java.
Suggest also ways for controlling illegal behaviors of applets.
- Explain the El-Gamal Digital Signature Scheme.
- Explain the two important aspects of any E-Voting scheme must
provide.
- Explain the virtues of the Solar Trust Model. What is provided by this
model?
- What are the crucial differences between Jini architecture and CORBA from
the mobility point of view?
|