Cover image for Developing Secure Distributed Systems with CORBA.
Developing Secure Distributed Systems with CORBA.
Title:
Developing Secure Distributed Systems with CORBA.
Author:
Land, Ulrich.
ISBN:
9781580535618
Personal Author:
Physical Description:
1 online resource (332 pages)
Contents:
Contents v -- Foreword xiii -- Preface xv -- Acknowledgments xvii -- 1 Introduction to CORBA 1 -- 1.1 Why CORBA? 1 -- 1.2 The Object Management Group 6 -- 1.3 The OMA 7 -- 1.4 CORBA 14 -- 1.5 How Does It All Work Together? 23 -- 1.6 Creating and Running an Application Example 26 -- 1.7 Summary 34 -- 1.8 Further Reading: Books on CORBA 35 -- References 35 -- 2 The Security Basics 37 -- 2.1 What Is Security? 37 -- 2.2 Why Security? 38 -- 2.3 Security Properties Within CORBA 39 -- 2.4 Security Management 43 -- 2.5 Threats, Vulnerabilities, and Countermeasures 50 -- 2.6 Middleware Security 53 -- 2.7 Summary 56 -- 2.8 Further Reading: Books on Security 57 -- References 57 -- 3 The CORBA Security Architecture 59 -- 3.1 Introduction 59 -- 3.2 Design Goals: CORBA Security Wish List 60 -- 3.3 Architectural Components 70 -- 3.4 Secure CORBA on the Internet 108 -- 3.5 Conformance 113 -- 3.6 Features or Wish List? 118 -- 3.7 Summary 122 -- 3.8 Further Reading: Books on CORBA Security 126 -- References 126 -- 4 Getting Started with MICOSec 129 -- 4.1 Introduction 129 -- 4.2 Free Software 129 -- 4.3 MICO 130 -- 4.4 MICOSec 132 -- 4.5 Summary 140 -- 4.6 Further Reading on MICO and MICOSec 140 -- References 141 -- 5 Security Level 1 143 -- 5.1 Introduction 143 -- 5.2 Level 1 Functionality 144 -- 5.3 Level 1 Interface 145 -- 5.4 A Security-Aware Bank Application Example 147 -- 5.5 Implementation Overview and Conformance 167 -- 5.6 Summary 170 -- 5.7 Further Reading 170 -- References 171 -- 6 Security Level 2 173 -- 6.1 Introduction 173 -- 6.2 Level 2 Functionality Overview 174 -- 6.3 Principal Authentication and Secure Association 175 -- 6.4 Object Domain Mapper for Access Control and Audit 200 -- 6.5 Access Control 216 -- 6.6 Security Auditing 247.

6.7 Delegation 259 -- 6.8 Implementation Overview and Conformance 264 -- 6.9 Summary 266 -- 6.10 Further Reading 267 -- References 267 -- 7 Security-Unaware Functionality 269 -- 7.1 Introduction 269 -- 7.2 Security-Unaware Functionality Overview 270 -- 7.3 Principal Authentication and Secure Association 271 -- 7.4 Object Domain Mapping 274 -- 7.5 Access Control 276 -- 7.6 Security Auditing 280 -- 7.7 Delegation 285 -- 7.8 Implementation Overview and Conformance 287 -- 7.9 Summary 289 -- 7.10 Further Reading 291 -- References 291 -- List of Acronyms 293 -- About the Authors 299 -- Index 301.
Abstract:
This new book is a clearly written, well structured guide to building secure distributed applications with CORBA. It helps securing CORBA applications, integrating security infrastructure with CORBA applications, and evaluating the security effectiveness of distributed applications. You get a comprehensive study of the CORBA security architecture, providing you with a better understanding of its goals and limitations. It serves as your complete reference for understanding security in distributed systems.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Added Author:
Electronic Access:
Click to View
Holds: Copies: