Vai al contenuto principale della pagina
Autore: | Lang Ulrich |
Titolo: | Developing secure distributed systems with CORBA / / Ulrich Lang, Rudolf Schreiner |
Pubblicazione: | Boston : , : Artech House, , ©2002 |
[Piscataqay, New Jersey] : , : IEEE Xplore, , [2002] | |
Descrizione fisica: | 1 online resource (332 p.) |
Disciplina: | 005.8 |
Soggetto topico: | CORBA (Computer architecture) |
Distributed operating systems (Computers) | |
Computer security | |
Soggetto genere / forma: | Electronic books. |
Altri autori: | SchreinerRudolf |
Note generali: | "Artech House computing library"--Ser. t.p. |
Nota di bibliografia: | Includes bibliographical references and index. |
Nota di contenuto: | Contents v; Foreword xiii; Preface xv; Acknowledgments xvii; 1 Introduction to CORBA 1; 1.1 Why CORBA? 1; 1.2 The Object Management Group 6; 1.3 The OMA 7; 1.4 CORBA 14; 1.5 How Does It All Work Together? 23; 1.6 Creating and Running an Application Example 26; 1.7 Summary 34; 1.8 Further Reading: Books on CORBA 35; References 35; 2 The Security Basics 37; 2.1 What Is Security? 37; 2.2 Why Security? 38; 2.3 Security Properties Within CORBA 39; 2.4 Security Management 43; 2.5 Threats, Vulnerabilities, and Countermeasures 50; 2.6 Middleware Security 53 |
2.7 Summary 562.8 Further Reading: Books on Security 57; References 57; 3 The CORBA Security Architecture 59; 3.1 Introduction 59; 3.2 Design Goals: CORBA Security Wish List 60; 3.3 Architectural Components 70; 3.4 Secure CORBA on the Internet 108; 3.5 Conformance 113; 3.6 Features or Wish List? 118; 3.7 Summary 122; 3.8 Further Reading: Books on CORBA Security 126; References 126; 4 Getting Started with MICOSec 129; 4.1 Introduction 129; 4.2 Free Software 129; 4.3 MICO 130; 4.4 MICOSec 132; 4.5 Summary 140; 4.6 Further Reading on MICO and MICOSec 140 | |
References 1415 Security Level 1 143; 5.1 Introduction 143; 5.2 Level 1 Functionality 144; 5.3 Level 1 Interface 145; 5.4 A Security-Aware Bank Application Example 147; 5.5 Implementation Overview and Conformance 167; 5.6 Summary 170; 5.7 Further Reading 170; References 171; 6 Security Level 2 173; 6.1 Introduction 173; 6.2 Level 2 Functionality Overview 174; 6.3 Principal Authentication and Secure Association 175; 6.4 Object Domain Mapper for Access Control and Audit 200; 6.5 Access Control 216; 6.6 Security Auditing 247; 6.7 Delegation 259 | |
6.8 Implementation Overview and Conformance 2646.9 Summary 266; 6.10 Further Reading 267; References 267; 7 Security-Unaware Functionality 269; 7.1 Introduction 269; 7.2 Security-Unaware Functionality Overview 270; 7.3 Principal Authentication and Secure Association 271; 7.4 Object Domain Mapping 274; 7.5 Access Control 276; 7.6 Security Auditing 280; 7.7 Delegation 285; 7.8 Implementation Overview and Conformance 287; 7.9 Summary 289; 7.10 Further Reading 291; References 291; List of Acronyms 293; About the Authors 299; Index 301 | |
Sommario/riassunto: | Annotation |
Titolo autorizzato: | Developing secure distributed systems with CORBA |
ISBN: | 1-58053-561-5 |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910455780903321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |