Developing secure distributed systems with CORBA (Q2783413)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Developing secure distributed systems with CORBA |
scientific article; zbMATH DE number 1729930
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Developing secure distributed systems with CORBA |
scientific article; zbMATH DE number 1729930 |
Statements
16 April 2002
0 references
distributed systems
0 references
security
0 references
Developing secure distributed systems with CORBA (English)
0 references
Chapter 1 gives a short introduction to the middleware technology CORBA. After an overview of the basic concepts and the architecture the author addresses the status, classification and perspective of CORBA in the frame of distributed systems. NEWLINENEWLINENEWLINEChapter 2 deals with security properties and their management. A consideration of the current Internet security features and potential threats leads to essential axioms defining certain security requirements for distributed applications. NEWLINENEWLINENEWLINEIn Chapter 3 a stepwise explanation of how to achieve a secure CORBA architecture can be found. Realization concepts for the concrete CORBA architecture will be given for each in Chapter 2 defined security requirement. The author emphasizes the consensus between the OMG and the CORBA security standard. For this purpose the security levels 1 and 2 as well as their functionality are explained. CORBA applications are distinguished between ``security-aware'' and ``security-unaware'' applications. For both categories a default security behavior is defined. NEWLINENEWLINENEWLINEChapter 4 is a reference to the MICOsec CORBA system, a secure CORBA system developed by the authors on the basis of the open source system MICO. The reference includes download and installation instruction. NEWLINENEWLINENEWLINEChapter 5 and 6 consider the security levels 1 and 2 with help of a commented client-server application. Especially the possible application of APIs for security-aware applications is shown. NEWLINENEWLINENEWLINEThe last Chapter 7 shows, how security-unaware applications can be used in a secure environment and how in this case the security features have to be organized. NEWLINENEWLINENEWLINEThe book can be recommended for students to study distributed systems as well as for software developer, especially in the eBusiness sector.
0 references