Object Wrapping Model and Application for Integration of Security Interface 


Vol. 29,  No. 2, pp. 333-341, Feb.  2004


PDF
  Abstract

Along with the innovative enhancement of Internet technology and the emergency of distributed systems extended from client-server computing, it becomes indispensible and necessary to integrate and interconnect old legacy systems. Since building a distributed system requires consistency of integration, the proper reuse of incumbent systems is critical to successful integration of current systems to distributed ones. CORBA(Common Object Request Broker Architecture) and object wrapping technique can provide middleware solutions that extend the applications of a legacy system with little modification to the application level while keeping client
consistency of standard interface. By using these techniques for system integration it is easier and faster to extend services on application development to distributed environments. We propose a model on object wrapping system that can manage, integrate, and separate the functions delivered from CORBA. We apply the object wrapping model specifically to integration of security system interfaces and also perform a test to verify the usability and the efficiency of our model.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

Y. S. Kim and H. S. Choi, "Object Wrapping Model and Application for Integration of Security Interface," The Journal of Korean Institute of Communications and Information Sciences, vol. 29, no. 2, pp. 333-341, 2004. DOI: .

[ACM Style]

Young Soo Kim and Heung Sik Choi. 2004. Object Wrapping Model and Application for Integration of Security Interface. The Journal of Korean Institute of Communications and Information Sciences, 29, 2, (2004), 333-341. DOI: .

[KICS Style]

Young Soo Kim and Heung Sik Choi, "Object Wrapping Model and Application for Integration of Security Interface," The Journal of Korean Institute of Communications and Information Sciences, vol. 29, no. 2, pp. 333-341, 2. 2004.