Engineering Information Abstracts (Part I) Title: PLATFORM INDEPENDENT CLASS REPOSITORY OF TMN IN PERSONAL COMMUNICATION NETWORK USING ENTITY-ASPECT ORIENTED PROGRAMMING Author(s): Park, Soo-Hyun; Park, Sang-Hoon; Baik, DooKwon Source: Proceedings of the 1997 4th International Workshop on Real-Time Computing Systems and Applications, RTCSA Oct 27-29 1997 Taipei, Taiwan. Sponsored by: IEEE Piscataway NJ USA. p 174-177 CODEN: 002229 Corporate Source: LG Information & Communications, Ltd, Seoul, South Korea Publication Year: 1997 Abstract: As Telecommunication Management Network ŽTMN. agents are constructed depending on different hardwares and operating systems, there are several problems in development, maintenance & administration of classes in Distributed Object ŽDO.. The representative problems are that since all of agents of TMN system should keep up their software and data blocks redundantly for the same functions, multi-platform can not be supported and the standards of Q3 interface implementation can not be set up. To solve the problems, Farming methodology based on Entity Aspect ŽEA. model has been suggested, which is originated from network computing concept. In order to support Farming methodology, Entity Aspect Oriented Programming ŽEAOP. is suggested also as a programming paradigm which is based on EA Model. EAOP is a paradigm that after real world objects are analyzed not in only one aspect but in several aspects, the aspect elements which are generated by the analysis are defined to Aspect-Objects. Using the EAOP, the distributed TMN agents of Personal Communication Network ŽPCN. are designed and implemented. In English ŽAuthor abstract . 5 Refs. EI Order Number: 98014020562 Keywords: Telecommunication networks; Object oriented programming; Computer hardware; Computer operating systems; Computer software; User interfaces; Standards; Problem solving; Personal communication systems
Title: DATA-INTENSIVE INTRA- & INTERNET APPLICATIONS - EXPERIENCES USING JAVA AND CORBA IN THE WORLD WIDE WEB Author(s): Sellentin, Juergen; Mitschang, Bernhard Source: Proceedings of the 1998 14th International Conference on Data Engineering Feb 23-27 1998 Orlando, FL, USA. IEEE Comp Soc Los Alamitos CA USA. p 302-311 CODEN: PIDEEG Corporate Source: Daimler-Benz AG Research & Technology, Ulm, Ger Publication Year: 1998 Abstract: IntrarInternet technology has become a key issue in the development of modern systems. Nowadays it is not sufficient anymore to present static information sheets through the WWW, instead we need interactive applications that may even compute complex results or process large data sets. In
409
this paper we describe a prototype based on Java and CORBA. Both represent modern concepts that have been developed to fulfill these requirements. Their combination results into the kind of data processing we want to apply to the WWW: First, portable, powerful, structured and even reusable client programs instead of cryptic HTML scripts, second, well defined interfaces, and third, efficient server processes separated from the WWW server and its CGI extensions. Communication is controlled by a fault tolerant CORBA layer, which also enables server development using a different language than Java. Besides a discussion of CORBA and its data shipping capabilities, we take a closer look at Java and its runtime behavior, and we report on the experiences gathered with our prototype system and its testbed application. This system has also been used to gather experiences with and to influence the new language binding of the Standard Data Access Interface ŽSDAI. of the Standard for the Exchange of Product Data ŽSTEP, ISO 10303. to Java. In English ŽAuthor abstract . 15 Refs. EI Order Number: 98034138474 Keywords: Wide area networks; Local area networks; High level languages; Computer architecture; Interactive computer systems; Data communication systems; Interfaces Žcomputer.; Fault tolerant computer systems; Data acquisition; Standards Title: SECURITY ARCHITECTURE FOR THE INTERNET PROTOCOL Author(s): Cheng, P.-C.; Garay, J.A.; Herzberg, A.; Krawczyk, H. Source: IBM Systems Journal v 37 n 1 1998. IBM Armonk NY USA. p 42-60 ISSN: 0018-8670 CODEN: IBMSA7 Publication Year: 1998 Abstract: In this paper we present the design, rationale, and implementation of a security architecture for protecting the secrecy and integrity of Internet traffic at the Internet Protocol ŽIP. layer. The design includes three components: Ž1. a security policy for determining when, where, and howsecurity measures are to be applied; Ž2. a modular key management protocol, called MKMP, for establishing shared secrets between communicating parties and meta-information prescribed by the security policy; and Ž3. the IP Security Protocol, as it is being standardized by the Internet Engineering Task Force, for applying security measures using information provided through the key management protocol. Effectively, these three components together allow for the establishment of a secure channel between any two communicating systems over the Internet. This technology is a component of IBM’s firewall product and is now being ported to other IBM computer platforms. In English ŽAuthor abstract . 31 Refs. EI Order Number: 98034096949 Keywords: Security of data; Wide area networks; Network protocols; Computer architecture; Data acquisition; Standards; Communication channels Žinformation theory.; Information retrieval Title: ATM KONTRA GIGABIT ETHERNET [ATM VERSUS GIGABIT ETHERNET] Author(s): Gisiger, Hans Peter