1.

Record Nr.

UNINA9910780161703321

Autore

Lang Ulrich

Titolo

Developing secure distributed systems with CORBA / / Ulrich Lang, Rudolf Schreiner

Pubbl/distr/stampa

Boston : , : Artech House, , ©2002

[Piscataqay, New Jersey] : , : IEEE Xplore, , [2002]

ISBN

1-58053-561-5

Descrizione fisica

1 online resource (332 p.)

Collana

Artech House computer security series

Altri autori (Persone)

SchreinerRudolf

Disciplina

005.8

Soggetti

CORBA (Computer architecture)

Distributed operating systems (Computers)

Computer security

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

"Artech House computing library"--Ser. t.p.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Contents  v; Foreword  xiii; Preface  xv; Acknowledgments  xvii; 1  Introduction to CORBA  1; 1.1  Why CORBA?  1; 1.2  The Object Management Group  6; 1.3  The OMA  7; 1.4  CORBA  14; 1.5  How Does It All Work Together?  23; 1.6  Creating and Running an Application Example  26; 1.7  Summary  34; 1.8  Further Reading: Books on CORBA  35; References  35; 2  The Security Basics  37; 2.1  What Is Security?  37; 2.2  Why Security?  38; 2.3  Security Properties Within CORBA  39; 2.4  Security Management  43; 2.5  Threats, Vulnerabilities, and Countermeasures  50; 2.6  Middleware Security  53

2.7  Summary  562.8  Further Reading: Books on Security  57; References  57; 3  The CORBA Security Architecture  59; 3.1  Introduction  59; 3.2  Design Goals: CORBA Security Wish List  60; 3.3  Architectural Components  70; 3.4  Secure CORBA on the Internet  108; 3.5  Conformance  113; 3.6  Features or Wish List?  118; 3.7  Summary  122; 3.8  Further Reading: Books on CORBA Security  126; References  126; 4  Getting Started with MICOSec  129; 4.1  Introduction  129; 4.2  Free Software  129; 4.3  MICO  130; 4.4  MICOSec  132; 4.5  Summary  140; 4.6  Further Reading on MICO and MICOSec  140

References  1415  Security Level 1  143; 5.1  Introduction  143; 5.2  Level 1 Functionality  144; 5.3  Level 1 Interface  145; 5.4  A Security-Aware Bank Application Example  147; 5.5  Implementation Overview



and Conformance  167; 5.6  Summary  170; 5.7  Further Reading  170; References  171; 6  Security Level 2  173; 6.1  Introduction  173; 6.2  Level 2 Functionality Overview  174; 6.3  Principal Authentication and Secure Association  175; 6.4  Object Domain Mapper for Access Control and Audit  200; 6.5  Access Control  216; 6.6  Security Auditing  247; 6.7  Delegation  259

6.8  Implementation Overview and Conformance  2646.9  Summary  266; 6.10  Further Reading  267; References  267; 7  Security-Unaware Functionality  269; 7.1  Introduction  269; 7.2  Security-Unaware Functionality Overview  270; 7.3  Principal Authentication and Secure Association  271; 7.4  Object Domain Mapping  274; 7.5  Access Control  276; 7.6  Security Auditing  280; 7.7  Delegation  285; 7.8  Implementation Overview and Conformance  287; 7.9  Summary  289; 7.10  Further Reading  291; References  291; List of Acronyms  293; About the Authors  299; Index  301

Sommario/riassunto

Annotation