Part V. Advanced
Prev
Next
Advanced
Table of Contents
21. ProActive Peer-to-Peer Infrastructure
21.1. Overview
21.2. The P2P Infrastructure Model
21.2.1. What is Peer-to-Peer?
21.2.2. The P2P Infrastructure in short
21.3. The P2P Infrastructure Implementation
21.3.1. Peers Implementation
21.3.2. Dynamic Shared ProActive Group
21.3.3. Sharing Node Mechanism
21.3.4. IC2D Screen shot
21.4. Installing and Using the P2P Infrastructure
21.4.1. Create your P2P Network
21.4.2. Example of Acquiring Nodes by ProActive XML Deployment Descriptors
21.4.3. The P2P Infrastructure API Usage Example
21.5. Future Work
22. ProActive Security Mechanism
22.1. Overview
22.2. Security Architecture
22.2.1. Base model
22.2.2. Security is expressed at different level according to who wants to set policy :
22.3. Detailed Security Architecture
22.3.1. Virtual Nodes and Nodes
22.3.2. Hierarchical Security Entities
22.3.3. Resource provider security features
22.3.4. Interactions, Security Attributes
22.3.5. Combining Policies
22.3.6. Dynamic Policy Negotiation
22.3.7. Migration and Negotiation
22.4. Activating security mechanism
22.4.1. Construction of an XML policy :
22.5. How to quickly generate certificate ?
23. Exporting Active Objects and components as web services
23.1. Overview
23.2. Principles
23.3. Pre-requisite : Installing the Web Server and the SOAP engine
23.4. Steps to expose an active object or a component as a web services
23.5. Undeploy the services
23.6. Accessing the services
23.7. Limitations
23.8. A simple example : Hello World
23.8.1. Hello World web service code
23.8.2. Access with Visual Studio
23.9. C# interoperability : an example with C3D
23.9.1. Overview
23.9.2. Access with a C# client
23.9.3. Dispatcher methods calls and callbacks
23.9.4. Download the C# example
24. ProActive on top of OSGi
24.1. Overview of OSGi -- Open Services Gateway initiative
24.2. ProActive bundle and service
24.3. Yet another Hello World
24.4. Current and Future works
© 2001-2005
INRIA Sophia Antipolis
All Rights Reserved