04495nam 2200661 450 991078016170332120230125232111.01-58053-561-5(CKB)111056486961510(EBL)227602(OCoLC)70748104(SSID)ssj0000137813(PQKBManifestationID)11148122(PQKBTitleCode)TC0000137813(PQKBWorkID)10096126(PQKB)11324883(Au-PeEL)EBL227602(CaPaEBR)ebr10081920(CaBNVSL)mat09101074(IEEE)9101074(MiAaPQ)EBC227602(EXLCZ)9911105648696151020200729d2002 uy engur|n|---|||||txtccrDeveloping secure distributed systems with CORBA /Ulrich Lang, Rudolf SchreinerBoston :Artech House,©2002.[Piscataqay, New Jersey] :IEEE Xplore,[2002]1 online resource (332 p.)Artech House computer security series"Artech House computing library"--Ser. t.p.1-58053-295-0 Includes bibliographical references and index.Contents v; Foreword xiii; Preface xv; Acknowledgments xvii; 1 Introduction to CORBA 1; 1.1 Why CORBA? 1; 1.2 The Object Management Group 6; 1.3 The OMA 7; 1.4 CORBA 14; 1.5 How Does It All Work Together? 23; 1.6 Creating and Running an Application Example 26; 1.7 Summary 34; 1.8 Further Reading: Books on CORBA 35; References 35; 2 The Security Basics 37; 2.1 What Is Security? 37; 2.2 Why Security? 38; 2.3 Security Properties Within CORBA 39; 2.4 Security Management 43; 2.5 Threats, Vulnerabilities, and Countermeasures 50; 2.6 Middleware Security 532.7 Summary 562.8 Further Reading: Books on Security 57; References 57; 3 The CORBA Security Architecture 59; 3.1 Introduction 59; 3.2 Design Goals: CORBA Security Wish List 60; 3.3 Architectural Components 70; 3.4 Secure CORBA on the Internet 108; 3.5 Conformance 113; 3.6 Features or Wish List? 118; 3.7 Summary 122; 3.8 Further Reading: Books on CORBA Security 126; References 126; 4 Getting Started with MICOSec 129; 4.1 Introduction 129; 4.2 Free Software 129; 4.3 MICO 130; 4.4 MICOSec 132; 4.5 Summary 140; 4.6 Further Reading on MICO and MICOSec 140References 1415 Security Level 1 143; 5.1 Introduction 143; 5.2 Level 1 Functionality 144; 5.3 Level 1 Interface 145; 5.4 A Security-Aware Bank Application Example 147; 5.5 Implementation Overview and Conformance 167; 5.6 Summary 170; 5.7 Further Reading 170; References 171; 6 Security Level 2 173; 6.1 Introduction 173; 6.2 Level 2 Functionality Overview 174; 6.3 Principal Authentication and Secure Association 175; 6.4 Object Domain Mapper for Access Control and Audit 200; 6.5 Access Control 216; 6.6 Security Auditing 247; 6.7 Delegation 2596.8 Implementation Overview and Conformance 2646.9 Summary 266; 6.10 Further Reading 267; References 267; 7 Security-Unaware Functionality 269; 7.1 Introduction 269; 7.2 Security-Unaware Functionality Overview 270; 7.3 Principal Authentication and Secure Association 271; 7.4 Object Domain Mapping 274; 7.5 Access Control 276; 7.6 Security Auditing 280; 7.7 Delegation 285; 7.8 Implementation Overview and Conformance 287; 7.9 Summary 289; 7.10 Further Reading 291; References 291; List of Acronyms 293; About the Authors 299; Index 301AnnotationThis is a clearly written, well-structured hands-on guide for the professional software developer and engineer who needs to build secure applications with CORBA.Artech House computer security series.CORBA (Computer architecture)Distributed operating systems (Computers)Computer securityCORBA (Computer architecture)Distributed operating systems (Computers)Computer security.005.8Lang Ulrich1545296Schreiner Rudolf1545297CaBNVSLCaBNVSLCaBNVSLBOOK9910780161703321Developing secure distributed systems with CORBA3800172UNINA