{"id":346536,"date":"2024-10-20T00:21:37","date_gmt":"2024-10-20T00:21:37","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-19500-22012\/"},"modified":"2024-10-25T23:49:04","modified_gmt":"2024-10-25T23:49:04","slug":"bs-iso-iec-19500-22012","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-19500-22012\/","title":{"rendered":"BS ISO\/IEC 19500-2:2012"},"content":{"rendered":"
This part of ISO\/IEC 19500 specifies a comprehensive, flexible approach to supporting networks of objects that are distributed across and managed by multiple, heterogeneous CORBA-compliant Object Request Brokers (ORBs). The approach to inter-ORB operation is universal, because elements can be combined in many ways to satisfy a very broad range of needs.<\/p>\n
This part of ISO\/IEC 19500 covers the specification of:<\/p>\n
ORB interoperability architecture<\/p>\n<\/li>\n
Inter-ORB bridge support<\/p>\n<\/li>\n
The General Inter-ORB Protocol (GIOP) for object request broker (ORB) interoperability. GIOP can be mapped onto any connection-oriented transport protocol that meets a minimal set of assumptions defined by this standard.<\/p>\n<\/li>\n
The Internet Inter-ORB Protocol (HOP), a specific mapping of the GIOP which runs directly over connections that use the Internet Protocol and the Transmission Control Protocol (TCP\/IP connections).<\/p>\n<\/li>\n
The CORBA Security Attribute Service (SAS) protocol and its use within the CSIv2 architecture to address the requirements of CORBA security for interoperable authentication, delegation, and privileges.<\/p>\n<\/li>\n<\/ul>\n
This part of ISO\/IEC 19500 provides a widely implemented and used particularization of ITU-T Rec. X.931 | ISO\/IEC 14752. Open Distributed Processing \u2014 Protocol Support for Computational Interactions. It supports interoperability and location transparency in ODP systems.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
11<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | Introduction Context of CORBA <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 1 Scope 2 Conformance and Compliance <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 2.1 Unreliable Multicast 3 Normative References <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 3.1 Other Specifications <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 4 Terms and Definitions 4.1 Recommendations | International Standards 4.2 Terms Defined in this Part of ISO\/IEC 19500 <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 4.3 Keywords for Requirment statements <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5 Symbols (and abbreviated terms) <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6 Interoperability Overview 6.1 General 6.2 Elements of Interoperability 6.2.1 ORB Interoperability Architecture 6.2.2 Inter-ORB Bridge Support <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 6.2.3 General Inter-ORB Protocol (GIOP) 6.2.4 Internet Inter-ORB Protocol (IIOP)\u00ae <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6.2.5 Environment-Specific Inter-ORB Protocols (ESIOPs) 6.3 Relationship to Previous Versions of CORBA <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 6.4 Examples of Interoperability Solutions 6.4.1 Example 1 6.4.2 Example 2 6.4.3 Example 3 6.4.4 Interoperability Compliance <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 6.5 Motivating Factors 6.5.1 ORB Implementation Diversity 6.5.2 ORB Boundaries 6.5.3 ORBs Vary in Scope, Distance, and Lifetime <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 6.6 Interoperability Design Goals 6.6.1 Non-Goals <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 7 ORB Interoperability Architecture 7.1 Overview 7.1.1 Domains 7.1.2 Bridging Domains <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 7.2 ORBs and ORB Services 7.2.1 The Nature of ORB Services 7.2.2 ORB Services and Object Requests <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 7.2.3 Selection of ORB Services 7.3 Domains <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 7.3.1 Definition of a Domain <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 7.3.2 Mapping Between Domains: Bridging 7.4 Interoperability Between ORBs 7.4.1 ORB Services and Domains <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 7.4.2 ORBs and Domains 7.4.3 Interoperability Approaches <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 7.4.4 Policy-Mediated Bridging 7.4.5 Configurations of Bridges in Networks <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 7.5 Object Addressing <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 7.5.1 Domain-relative Object Referencing 7.5.2 Handling of Referencing Between Domains <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 7.6 An Information Model for Object References 7.6.1 What Information Do Bridges Need? 7.6.2 Interoperable Object References: IORs <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 7.6.3 IOR Profiles <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 7.6.4 Standard IOR Profiles <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 7.6.5 IOR Components 7.6.6 Standard IOR Components <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 7.6.7 Profile and Component Composition in IORs <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 7.6.8 IOR Creation and Scope 7.6.9 Stringified Object References <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 7.6.10 Object URLs <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 7.7 Service Context <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 7.7.1 Standard Service Contexts <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 7.7.2 Service Context Processing Rules 7.8 Coder\/Decoder Interfaces 7.8.1 Codec Interface <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | 7.8.2 Codec Factory <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 7.9 Feature Support and GIOP Versions <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | 7.10 Code Set Conversion 7.10.1 Character Processing Terminology <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | 7.10.2 Code Set Conversion Framework <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | 7.10.3 Mapping to Generic Character Environments <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | 7.10.4 Example of Generic Environment Mapping 7.10.5 Relevant OSFM Registry Interfaces <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | 8 Building Inter-ORB Bridges 8.1 Introduction 8.2 In-Line and Request-Level Bridging <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | 8.2.1 In-line Bridging 8.2.2 Request-level Bridging <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | 8.2.3 Collocated ORBs <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | 8.3 Proxy Creation and Management 8.4 Interface-specific Bridges and Generic Bridges 8.5 Building Generic Request-Level Bridges <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | 8.6 Bridging Non-Referencing Domains <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | 8.7 Bootstrapping Bridges <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | 9 General Inter-ORB Protocol 9.1 Overview 9.2 Goals of the General Inter-ORB Protocol 9.3 GIOP Overview <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | 9.3.1 Common Data Representation (CDR) 9.3.2 GIOP Message Overview <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | 9.3.3 GIOP Message Transfer 9.4 CDR Transfer Syntax <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | 9.4.1 Primitive Types <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | 9.4.2 OMG IDL Constructed Types <\/td>\n<\/tr>\n | ||||||
93<\/td>\n | 9.4.3 Encapsulation <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | 9.4.4 Value Types <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | 9.4.5 Pseudo-Object Types <\/td>\n<\/tr>\n | ||||||
107<\/td>\n | 9.4.6 Object References 9.4.7 Abstract Interfaces 9.5 GIOP Message Formats <\/td>\n<\/tr>\n | ||||||
108<\/td>\n | 9.5.1 GIOP Message Header <\/td>\n<\/tr>\n | ||||||
110<\/td>\n | 9.5.2 Request Message <\/td>\n<\/tr>\n | ||||||
113<\/td>\n | 9.5.3 Reply Message <\/td>\n<\/tr>\n | ||||||
116<\/td>\n | 9.5.4 CancelRequest Message <\/td>\n<\/tr>\n | ||||||
117<\/td>\n | 9.5.5 LocateRequest Message <\/td>\n<\/tr>\n | ||||||
118<\/td>\n | 9.5.6 LocateReply Message <\/td>\n<\/tr>\n | ||||||
120<\/td>\n | 9.5.7 CloseConnection Message 9.5.8 MessageError Message 9.5.9 Fragment Message <\/td>\n<\/tr>\n | ||||||
121<\/td>\n | 9.6 GIOP Message Transport <\/td>\n<\/tr>\n | ||||||
122<\/td>\n | 9.6.1 Connection Management <\/td>\n<\/tr>\n | ||||||
123<\/td>\n | 9.6.2 Message Ordering <\/td>\n<\/tr>\n | ||||||
124<\/td>\n | 9.7 Object Location <\/td>\n<\/tr>\n | ||||||
125<\/td>\n | 9.8 Internet Inter-ORB Protocol (IIOP) 9.8.1 TCP\/IP Connection Usage <\/td>\n<\/tr>\n | ||||||
126<\/td>\n | 9.8.2 IIOP IOR Profiles <\/td>\n<\/tr>\n | ||||||
128<\/td>\n | 9.8.3 IIOP IOR Profile Components <\/td>\n<\/tr>\n | ||||||
129<\/td>\n | 9.9 Bi-Directional GIOP <\/td>\n<\/tr>\n | ||||||
131<\/td>\n | 9.9.1 Bi-directional IIOP <\/td>\n<\/tr>\n | ||||||
132<\/td>\n | 9.10 Bi-directional GIOP policy <\/td>\n<\/tr>\n | ||||||
133<\/td>\n | 9.11 OMG IDL 9.11.1 GIOP Module <\/td>\n<\/tr>\n | ||||||
137<\/td>\n | 9.11.2 IIOP Module <\/td>\n<\/tr>\n | ||||||
138<\/td>\n | 9.11.3 BiDirPolicy Module <\/td>\n<\/tr>\n | ||||||
139<\/td>\n | 10 Secure Interoperability 10.1 Overview <\/td>\n<\/tr>\n | ||||||
140<\/td>\n | 10.1.1 Assumptions <\/td>\n<\/tr>\n | ||||||
141<\/td>\n | 10.2 Protocol Message Definitions 10.2.1 The Security Attribute Service Context Element 10.2.2 SAS context_data Message Body Types <\/td>\n<\/tr>\n | ||||||
146<\/td>\n | 10.2.3 Authorization Token Format <\/td>\n<\/tr>\n | ||||||
147<\/td>\n | 10.2.4 Client Authentication Token Format <\/td>\n<\/tr>\n | ||||||
149<\/td>\n | 10.2.5 Identity Token Format <\/td>\n<\/tr>\n | ||||||
150<\/td>\n | 10.2.6 Principal Names and Distinguished Names <\/td>\n<\/tr>\n | ||||||
151<\/td>\n | 10.3 Security Attribute Service Protocol 10.3.1 Compound Mechanisms <\/td>\n<\/tr>\n | ||||||
155<\/td>\n | 10.3.2 Session Semantics <\/td>\n<\/tr>\n | ||||||
157<\/td>\n | 10.3.3 TSS State Machine <\/td>\n<\/tr>\n | ||||||
160<\/td>\n | 10.3.4 CSS State Machine <\/td>\n<\/tr>\n | ||||||
163<\/td>\n | 10.3.5 ContextError Values and Exceptions <\/td>\n<\/tr>\n | ||||||
164<\/td>\n | 10.4 Transport Security Mechanisms 10.4.1 Transport Layer Interoperability 10.4.2 Transport Mechanism Configuration <\/td>\n<\/tr>\n | ||||||
165<\/td>\n | 10.5 Interoperable Object References 10.5.1 Target Security Configuration <\/td>\n<\/tr>\n | ||||||
174<\/td>\n | 10.5.2 Client-side Mechanism Selection <\/td>\n<\/tr>\n | ||||||
175<\/td>\n | 10.5.3 Client-Side Requirements and Location Binding <\/td>\n<\/tr>\n | ||||||
176<\/td>\n | 10.5.4 Server Side Consideration 10.6 Conformance Levels 10.6.1 Conformance Level 0 <\/td>\n<\/tr>\n | ||||||
177<\/td>\n | 10.6.2 Conformance Level 1 10.6.3 Conformance Level 2 <\/td>\n<\/tr>\n | ||||||
178<\/td>\n | 10.6.4 Stateful Conformance 10.7 Sample Message Flows and Scenarios <\/td>\n<\/tr>\n | ||||||
179<\/td>\n | 10.7.1 Confidentiality, Trust in Server, and Trust in Client Established in the Connection <\/td>\n<\/tr>\n | ||||||
181<\/td>\n | 10.7.2 Confidentiality and Trust in Server Established in the Connection – Stateless Trust in Client Established in Service Context <\/td>\n<\/tr>\n | ||||||
183<\/td>\n | 10.7.3 Confidentiality, Trust in Server, and Trust in Client Established in the Connection Stateless Trust Association Established in Service Context <\/td>\n<\/tr>\n | ||||||
186<\/td>\n | 10.7.4 Confidentiality, Trust in Server, and Trust in Client Established in the Connection – Stateless Forward Trust Association Established in Service Context <\/td>\n<\/tr>\n | ||||||
187<\/td>\n | 10.8 References <\/td>\n<\/tr>\n | ||||||
188<\/td>\n | 10.9 IDL 10.9.1 Module GSSUP – Username\/Password GSSAPI Token Formats <\/td>\n<\/tr>\n | ||||||
189<\/td>\n | 10.9.2 Module CSI – Common Secure Interoperability <\/td>\n<\/tr>\n | ||||||
193<\/td>\n | 10.9.3 Module CSIIOP – CSIv2 IOR Component Tag Definitions <\/td>\n<\/tr>\n | ||||||
197<\/td>\n | 11 Unreliable Multicast Inter-ORB Protocol 11.1 Introduction 11.1.1 Purpose 11.1.2 MIOP Packet 11.1.3 Packet Collection <\/td>\n<\/tr>\n | ||||||
198<\/td>\n | 11.1.4 PacketHeader <\/td>\n<\/tr>\n | ||||||
199<\/td>\n | 11.1.5 Joining an IP\/Multicast Group <\/td>\n<\/tr>\n | ||||||
200<\/td>\n | 11.1.6 Quality Of Service 11.1.7 Delivery Requirements 11.2 MIOP Object Model 11.2.1 Definition <\/td>\n<\/tr>\n | ||||||
201<\/td>\n | 11.2.2 Unreliable IP\/Multicast Profile Body (UIPMC_ProfileBody) <\/td>\n<\/tr>\n | ||||||
203<\/td>\n | 11.2.3 Group IOR <\/td>\n<\/tr>\n | ||||||
205<\/td>\n | 11.2.4 Extending PortableServer::POA to include Group Operations <\/td>\n<\/tr>\n | ||||||
208<\/td>\n | 11.2.5 MIOP Gateway 11.2.6 Multicast Group Manager <\/td>\n<\/tr>\n | ||||||
224<\/td>\n | 11.2.7 MIOP URL <\/td>\n<\/tr>\n | ||||||
225<\/td>\n | 11.3 Request Issues 11.3.1 GIOP Request Message Compatibility 11.3.2 MIOP Request Efficiency <\/td>\n<\/tr>\n | ||||||
226<\/td>\n | 11.3.3 Client Use Cases <\/td>\n<\/tr>\n | ||||||
227<\/td>\n | 11.3.4 Server Use Cases 11.4 Consolidated IDL 11.4.1 OMG IDL <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Object Management Group. Common Object Request Broker Architecture (CORBA) – Interoperability<\/b><\/p>\n |