LEADER 04495nam 2200661 450 001 9910780161703321 005 20230125232111.0 010 $a1-58053-561-5 035 $a(CKB)111056486961510 035 $a(EBL)227602 035 $a(OCoLC)70748104 035 $a(SSID)ssj0000137813 035 $a(PQKBManifestationID)11148122 035 $a(PQKBTitleCode)TC0000137813 035 $a(PQKBWorkID)10096126 035 $a(PQKB)11324883 035 $a(Au-PeEL)EBL227602 035 $a(CaPaEBR)ebr10081920 035 $a(CaBNVSL)mat09101074 035 $a(IEEE)9101074 035 $a(MiAaPQ)EBC227602 035 $a(EXLCZ)99111056486961510 100 $a20200729d2002 uy 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aDeveloping secure distributed systems with CORBA /$fUlrich Lang, Rudolf Schreiner 210 1$aBoston :$cArtech House,$dİ2002. 210 2$a[Piscataqay, New Jersey] :$cIEEE Xplore,$d[2002] 215 $a1 online resource (332 p.) 225 1 $aArtech House computer security series 300 $a"Artech House computing library"--Ser. t.p. 311 $a1-58053-295-0 320 $aIncludes bibliographical references and index. 327 $aContents v; Foreword xiii; Preface xv; Acknowledgments xvii; 1 Introduction to CORBA 1; 1.1 Why CORBA? 1; 1.2 The Object Management Group 6; 1.3 The OMA 7; 1.4 CORBA 14; 1.5 How Does It All Work Together? 23; 1.6 Creating and Running an Application Example 26; 1.7 Summary 34; 1.8 Further Reading: Books on CORBA 35; References 35; 2 The Security Basics 37; 2.1 What Is Security? 37; 2.2 Why Security? 38; 2.3 Security Properties Within CORBA 39; 2.4 Security Management 43; 2.5 Threats, Vulnerabilities, and Countermeasures 50; 2.6 Middleware Security 53 327 $a2.7 Summary 562.8 Further Reading: Books on Security 57; References 57; 3 The CORBA Security Architecture 59; 3.1 Introduction 59; 3.2 Design Goals: CORBA Security Wish List 60; 3.3 Architectural Components 70; 3.4 Secure CORBA on the Internet 108; 3.5 Conformance 113; 3.6 Features or Wish List? 118; 3.7 Summary 122; 3.8 Further Reading: Books on CORBA Security 126; References 126; 4 Getting Started with MICOSec 129; 4.1 Introduction 129; 4.2 Free Software 129; 4.3 MICO 130; 4.4 MICOSec 132; 4.5 Summary 140; 4.6 Further Reading on MICO and MICOSec 140 327 $aReferences 1415 Security Level 1 143; 5.1 Introduction 143; 5.2 Level 1 Functionality 144; 5.3 Level 1 Interface 145; 5.4 A Security-Aware Bank Application Example 147; 5.5 Implementation Overview and Conformance 167; 5.6 Summary 170; 5.7 Further Reading 170; References 171; 6 Security Level 2 173; 6.1 Introduction 173; 6.2 Level 2 Functionality Overview 174; 6.3 Principal Authentication and Secure Association 175; 6.4 Object Domain Mapper for Access Control and Audit 200; 6.5 Access Control 216; 6.6 Security Auditing 247; 6.7 Delegation 259 327 $a6.8 Implementation Overview and Conformance 2646.9 Summary 266; 6.10 Further Reading 267; References 267; 7 Security-Unaware Functionality 269; 7.1 Introduction 269; 7.2 Security-Unaware Functionality Overview 270; 7.3 Principal Authentication and Secure Association 271; 7.4 Object Domain Mapping 274; 7.5 Access Control 276; 7.6 Security Auditing 280; 7.7 Delegation 285; 7.8 Implementation Overview and Conformance 287; 7.9 Summary 289; 7.10 Further Reading 291; References 291; List of Acronyms 293; About the Authors 299; Index 301 330 8 $aAnnotation$bThis is a clearly written, well-structured hands-on guide for the professional software developer and engineer who needs to build secure applications with CORBA. 410 0$aArtech House computer security series. 606 $aCORBA (Computer architecture) 606 $aDistributed operating systems (Computers) 606 $aComputer security 615 0$aCORBA (Computer architecture) 615 0$aDistributed operating systems (Computers) 615 0$aComputer security. 676 $a005.8 700 $aLang$b Ulrich$01545296 701 $aSchreiner$b Rudolf$01545297 801 0$bCaBNVSL 801 1$bCaBNVSL 801 2$bCaBNVSL 906 $aBOOK 912 $a9910780161703321 996 $aDeveloping secure distributed systems with CORBA$93800172 997 $aUNINA