Зарегистрироваться
Восстановить пароль
FAQ по входу

Lang Ulrich, Schreiner Rudolf. Developing Secure Distributed Systems with CORBA

  • Файл формата pdf
  • размером 2,00 МБ
  • Добавлен пользователем
  • Описание отредактировано
Lang Ulrich, Schreiner Rudolf. Developing Secure Distributed Systems with CORBA
Artech House, 2002. — 308 p. — ISBN 1580532950.
This new book is a clearly written, well structured guide to building secure distributed applications with CORBA. It helps securing CORBA applications, integrating security infrastructure with CORBA applications, and evaluating the security effectivenessof distributed applications. You get a comprehensive study of the CORBA security architecture, providing you with a better understanding of its goals and limitations. It serves as your complete reference for understanding security in distributed systems.
The book also generously illustrates the usage of the MICOSec CORBA security services implementation, including important information on the installation and configuration of MICOSec, the usage of two different kinds of application-facing interfaces,and the configuration of CORBA security for applications that do not contain any security-related modifications.
Introduction to CORBA
Why CORBA?
The Object Management Group.
The OMA.
CORBA.
How Does It All Work Together?
Further Reading: Books on CORBA.
The Security Basics
What Is Security?
Why Security?
Security Properties Within CORBA.
Security Management.
Threats, Vulnerabilities, and Countermeasures.
Middleware Security.
Further Reading: Books on Security.
The CORBA Security Architecture
Design Goals: CORBA Security Wish List.
Architectural Components.
Secure CORBA on the Internet.
Conformance.
Features or Wish List?
Further Reading: Books on CORBA Security.
Getting Started with MICOSec
Free Software.
MICO.
MICOSec.
Further Reading on MICO and MICOSec.
Security Level 1
Level 1 Functionality.
Level 1 Interface.
A Security-Aware Bank Application Example.
mplementation Overview and Conformance.
Further Reading.
Security Level 2
Level 2 Functionality Overview.
Principal Authentication and Secure Association.
Object Domain Mapper for Access Control and Audit.
Access Control.
Security Auditing.
Delegation.
Implementation Overview and Conformance.
Further Reading.
Security-Unaware Functionality
Security-Unaware Functionality Overview.
Principal Authentication and Secure Association.
Object Domain Mapping.
Security Auditing.
Delegation.
Implementation Overview and Conformance.
Further Reading.
List of Acronyms
About the Authors
Index
  • Чтобы скачать этот файл зарегистрируйтесь и/или войдите на сайт используя форму сверху.
  • Регистрация