Skip to:Content
|
Bottom
Cover image for Developing secure distributed systems with CORBA
Title:
Developing secure distributed systems with CORBA
Personal Author:
Series:
Artech House computer security series
Publication Information:
London : Artech House, 2002
ISBN:
9781580532952
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000004826792 QA76.9.A73 L36 2002 Open Access Book Book
Searching...
Searching...
30000010029212 QA76.9.A73 L36 2002 Open Access Book Book
Searching...

On Order

Summary

Summary

This text is a clearly-written guide to building secure distributed applications with CORBA. It helps securing CORBA applications, integrating security infrastructure with CORBA applications, and evaluating the security effectiveness of distributed applications. The book provides a comprehensive study of the CORBA security architecture, allowing for a better understanding of its goals and limitations. It is designed to servwe as a complete reference for understanding security in distributed systems.


Author Notes

Ulrich Lang received his M.Sc. in Information Security from Royal Holloway College, at the University of London. Before that, he studied computer science with management at the Ludwig-Maximilians-Universität in Munich, Germany.

Mr. Lang is a researcher at the University of Cambridge Computer Laboratory, co-founder and Research Director of ObjectSecurity Ltd.

050


Table of Contents

Forewordp. xiii
Prefacep. xv
Acknowledgmentsp. xvii
1 Introduction to CORBAp. 1
1.1 Why CORBA?p. 1
1.1.1 The Business Perspectivep. 1
1.1.2 The Technical Perspectivep. 2
1.2 The Object Management Groupp. 6
1.3 The OMAp. 7
1.3.1 Introductionp. 7
1.3.2 ORBp. 8
1.3.3 Object Servicesp. 9
1.3.4 Common Facilities and Domainsp. 13
1.3.5 Application Interfacesp. 13
1.3.6 Object Frameworksp. 14
1.4 CORBAp. 14
1.4.1 ORB Corep. 15
1.4.2 Object Referencesp. 16
1.4.3 OMG IDLp. 17
1.4.4 Language Mappingsp. 18
1.4.5 Static Invocation: Stubs and Skeletonsp. 19
1.4.6 Interface and Implementation Repositoriesp. 19
1.4.7 Dynamic Invocation and Dispatchp. 20
1.4.8 Object Adaptersp. 21
1.4.9 Inter-ORB Protocolsp. 22
1.5 How Does It All Work Together?p. 23
1.5.1 The Client System at Run-Timep. 24
1.5.2 The Server System at Run-Timep. 26
1.5.3 Other Componentsp. 26
1.6 Creating and Running an Example Applicationp. 26
1.6.1 Writing a CORBA Applicationp. 27
1.6.2 Running a CORBA Applicationp. 34
1.7 Summaryp. 34
1.8 Further Reading: Books on CORBAp. 35
Referencesp. 35
2 The Security Basicsp. 37
2.1 What Is Security?p. 37
2.2 Why Security?p. 38
2.3 Security Properties Within CORBAp. 39
2.3.1 Confidentialityp. 40
2.3.2 Integrityp. 41
2.3.3 Availabilityp. 41
2.3.4 Accountabilityp. 42
2.3.5 Dependabilityp. 42
2.4 Security Managementp. 43
2.4.1 Security Policyp. 43
2.4.2 Risk Analysisp. 47
2.4.3 Feedback: Analysis and Auditp. 49
2.5 Threats, Vulnerabilities, and Countermeasuresp. 50
2.5.1 Threatsp. 50
2.5.2 Vulnerabilitiesp. 52
2.5.3 Countermeasuresp. 53
2.6 Middleware Securityp. 53
2.6.1 Mutual Distrustp. 54
2.6.2 Dynamic Interactionsp. 54
2.6.3 Scalabilityp. 55
2.6.4 Layers of Abstractionp. 55
2.7 Summaryp. 56
2.8 Further Reading: Books on Securityp. 57
Referencesp. 57
3 The CORBA Security Architecturep. 59
3.1 Introductionp. 59
3.2 Design Goals: CORBA Security Wish Listp. 60
3.2.1 Interoperabilityp. 60
3.2.2 Transparency and Abstractionp. 62
3.2.3 Flexibility, Portability, and Integrationp. 64
3.2.4 Scalabilityp. 66
3.2.5 Reliability and Assurancep. 67
3.2.6 Simplicityp. 69
3.3 Architectural Componentsp. 70
3.3.1 Principals and Credentialsp. 70
3.3.2 Administration: Policies and Domainsp. 72
3.3.3 Privilege Delegationp. 78
3.3.4 Principal Authenticationp. 81
3.3.5 Security Context Establishmentp. 85
3.3.6 Message Protectionp. 90
3.3.7 Access Controlp. 96
3.3.8 Security Auditp. 101
3.3.9 Nonrepudiationp. 105
3.4 Secure CORBA on the Internetp. 108
3.4.1 SSL/TLSp. 109
3.4.2 Firewallsp. 110
3.5 Conformancep. 113
3.5.1 Level 1 Securityp. 114
3.5.2 Level 2 Securityp. 115
3.5.3 Nonrepudiation Optionp. 116
3.5.4 Security Replaceabilityp. 116
3.5.5 CSIp. 117
3.6 Features or Wish List?p. 118
3.6.1 Interoperabilityp. 119
3.6.2 Transparency and Abstractionp. 120
3.6.3 Flexibility, Portability, Integrationp. 120
3.6.4 Scalabilityp. 121
3.6.5 Reliability and Assurancep. 121
3.6.6 Simplicityp. 121
3.7 Summaryp. 122
3.8 Further Reading: Books on CORBA Securityp. 126
Referencesp. 126
4 Getting Started with MICOSecp. 129
4.1 Introductionp. 129
4.2 Free Softwarep. 129
4.3 MICOp. 130
4.3.1 Overviewp. 130
4.3.2 Installationp. 131
4.4 MICOSecp. 132
4.4.1 Overviewp. 133
4.4.2 Installationp. 134
4.5 Summaryp. 140
4.6 Further Reading on MICO and MICOSecp. 140
Referencesp. 141
5 Security Level 1p. 143
5.1 Introductionp. 143
5.2 Level 1 Functionalityp. 144
5.3 Level 1 Interfacep. 145
5.4 A Security-Aware Bank Application Examplep. 147
5.4.1 Building and Running the Examplep. 147
5.4.2 SSL and X.509 Certificatesp. 151
5.4.3 The Targetp. 154
5.4.4 Security Attributesp. 161
5.4.5 The Clientp. 164
5.5 Implementation Overview and Conformancep. 167
5.6 Summaryp. 170
5.7 Further Readingp. 170
Referencesp. 171
6 Security Level 2p. 173
6.1 Introductionp. 173
6.2 Level 2 Functionality Overviewp. 174
6.3 Principal Authentication and Secure Associationp. 175
6.3.1 Principal Authenticationp. 176
6.3.2 Secure Associationp. 179
6.3.3 Security-Aware Bank Example: Authentication and Secure Associationp. 180
6.3.4 Building and Running the Examplep. 181
6.3.5 The Targetp. 183
6.3.6 The Clientp. 194
6.4 Object Domain Mapper for Access Control and Auditp. 200
6.4.1 Introductionp. 200
6.4.2 Mapping Informationp. 201
6.4.3 MICOSec Mapping Definitionp. 203
6.4.4 Mapping Processp. 206
6.4.5 ODM Interfacesp. 207
6.4.6 Static Per-POA Granularityp. 209
6.4.7 Per-Object Granularityp. 212
6.4.8 Dynamic Configurationp. 213
6.4.9 Modifications to the CORBA Specificationp. 215
6.5 Access Controlp. 216
6.5.1 Interfacesp. 218
6.5.2 The Bank Examplep. 220
6.5.3 Building and Running the Examplep. 221
6.5.4 The Targetp. 225
6.5.5 Client-Side Code Examplep. 242
6.6 Security Auditingp. 247
6.6.1 Audit Interfacesp. 247
6.6.2 Audit Filtering Policiesp. 249
6.6.3 Building and Running the Examplep. 252
6.6.4 Target Examplep. 253
6.7 Delegationp. 259
6.7.1 Overviewp. 259
6.7.2 Delegation Mechanismsp. 261
6.8 Implementation Overview and Conformancep. 264
6.9 Summaryp. 266
6.10 Further Readingp. 267
Referencesp. 267
7 Security-Unaware Functionalityp. 269
7.1 Introductionp. 269
7.2 Security-Unaware Functionality Overviewp. 270
7.3 Principal Authentication and Secure Associationp. 271
7.3.1 Command Line Argumentsp. 271
7.3.2 Example Configurationp. 273
7.4 Object Domain Mappingp. 274
7.5 Access Controlp. 276
7.5.1 Bank Examplep. 276
7.6 Security Auditingp. 280
7.6.1 Example Configurationp. 281
7.7 Delegationp. 285
7.7.1 Overviewp. 285
7.7.2 SSL and Delegationp. 286
7.7.3 CSIv2-SAS Delegationp. 287
7.8 Implementation Overview and Conformancep. 287
7.9 Summaryp. 289
7.10 Further Readingp. 291
Referencesp. 291
List of Acronymsp. 293
About the Authorsp. 299
Indexp. 301
Go to:Top of Page