Please use this identifier to cite or link to this item: http://hdl.handle.net/20.500.12188/24354
DC FieldValueLanguage
dc.contributor.authorSpasov, Zoranen_US
dc.contributor.authorMadevska Bogdanova, Anaen_US
dc.date.accessioned2022-11-14T12:21:25Z-
dc.date.available2022-11-14T12:21:25Z-
dc.date.issued2010-
dc.identifier.urihttp://hdl.handle.net/20.500.12188/24354-
dc.description.abstractIn this paper we look at the inter-process communication (IPC) also known as inter-thread or inter-application communication from other knowledge sources. We will look and analyze the different types of IPC in the Microsoft Windows operating system, their implementation and the usefulness of this kind of approach in the terms of communication between processes. Only local implementation of the IPC will be addressed in this paper. Special emphasis will be given to the system mechanisms that are involved with the creation, management, and use of named pipes and sockets. This paper will discuss some of the IPC options and techniques that are available to Microsoft Windows programmers. We will make a comparison between Microsoft remoting and Microsoft message queues (pros and cons). Finally we will make some notes and remarks regarding several issues and concerns about the security of the local system when using these methods, in order to use this knowledge in building a system that will control processes within different desktop environments. At the end, we will give some conclusions about the implementation and use of the IPC methods, including local security guidelines.en_US
dc.publisherInstitute of Informatics, Faculty of Natural Sciences and Mathematics, Ss. Cyril and Methodius University in Skopje, Macedoniaen_US
dc.titleInter-process communication, analysis, guidelines and its impact on computer securityen_US
dc.typeProceedingsen_US
dc.relation.conferenceThe 7th International Conference for Informatics and Information Technology (CIIT 2010)en_US
item.fulltextWith Fulltext-
item.grantfulltextopen-
Appears in Collections:Faculty of Computer Science and Engineering: Conference papers
Files in This Item:
File Description SizeFormat 
7CiiT-11.pdf331.4 kBAdobe PDFView/Open
Show simple item record

Page view(s)

83
checked on Sep 22, 2024

Download(s)

36
checked on Sep 22, 2024

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.