Vai al contenuto principale della pagina

Developing secure distributed systems with CORBA / / Ulrich Lang, Rudolf Schreiner



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Lang Ulrich Visualizza persona
Titolo: Developing secure distributed systems with CORBA / / Ulrich Lang, Rudolf Schreiner Visualizza cluster
Pubblicazione: Boston : , : Artech House, , ©2002
[Piscataqay, New Jersey] : , : IEEE Xplore, , [2002]
Descrizione fisica: 1 online resource (332 p.)
Disciplina: 005.8
Soggetto topico: CORBA (Computer architecture)
Distributed operating systems (Computers)
Computer security
Altri autori: SchreinerRudolf  
Note generali: "Artech House computing library"--Ser. t.p.
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: Contents v; Foreword xiii; Preface xv; Acknowledgments xvii; 1 Introduction to CORBA 1; 1.1 Why CORBA? 1; 1.2 The Object Management Group 6; 1.3 The OMA 7; 1.4 CORBA 14; 1.5 How Does It All Work Together? 23; 1.6 Creating and Running an Application Example 26; 1.7 Summary 34; 1.8 Further Reading: Books on CORBA 35; References 35; 2 The Security Basics 37; 2.1 What Is Security? 37; 2.2 Why Security? 38; 2.3 Security Properties Within CORBA 39; 2.4 Security Management 43; 2.5 Threats, Vulnerabilities, and Countermeasures 50; 2.6 Middleware Security 53
2.7 Summary 562.8 Further Reading: Books on Security 57; References 57; 3 The CORBA Security Architecture 59; 3.1 Introduction 59; 3.2 Design Goals: CORBA Security Wish List 60; 3.3 Architectural Components 70; 3.4 Secure CORBA on the Internet 108; 3.5 Conformance 113; 3.6 Features or Wish List? 118; 3.7 Summary 122; 3.8 Further Reading: Books on CORBA Security 126; References 126; 4 Getting Started with MICOSec 129; 4.1 Introduction 129; 4.2 Free Software 129; 4.3 MICO 130; 4.4 MICOSec 132; 4.5 Summary 140; 4.6 Further Reading on MICO and MICOSec 140
References 1415 Security Level 1 143; 5.1 Introduction 143; 5.2 Level 1 Functionality 144; 5.3 Level 1 Interface 145; 5.4 A Security-Aware Bank Application Example 147; 5.5 Implementation Overview and Conformance 167; 5.6 Summary 170; 5.7 Further Reading 170; References 171; 6 Security Level 2 173; 6.1 Introduction 173; 6.2 Level 2 Functionality Overview 174; 6.3 Principal Authentication and Secure Association 175; 6.4 Object Domain Mapper for Access Control and Audit 200; 6.5 Access Control 216; 6.6 Security Auditing 247; 6.7 Delegation 259
6.8 Implementation Overview and Conformance 2646.9 Summary 266; 6.10 Further Reading 267; References 267; 7 Security-Unaware Functionality 269; 7.1 Introduction 269; 7.2 Security-Unaware Functionality Overview 270; 7.3 Principal Authentication and Secure Association 271; 7.4 Object Domain Mapping 274; 7.5 Access Control 276; 7.6 Security Auditing 280; 7.7 Delegation 285; 7.8 Implementation Overview and Conformance 287; 7.9 Summary 289; 7.10 Further Reading 291; References 291; List of Acronyms 293; About the Authors 299; Index 301
Sommario/riassunto: Annotation
Titolo autorizzato: Developing secure distributed systems with CORBA  Visualizza cluster
ISBN: 1-58053-561-5
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910780161703321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Artech House computer security series.