Artech House, 2002. — 308 p. — ISBN 1580532950.
This new book is a clearly written, well structured guide to building secure distributed applications with CORBA. It helps securing CORBA applications, integrating security infrastructure with CORBA applications, and evaluating the security effectivenessof distributed applications. You get a comprehensive study of the CORBA security architecture, providing you with a better understanding of its goals and limitations. It serves as your complete reference for understanding security in distributed systems.
The book also generously illustrates the usage of the MICOSec CORBA security services implementation, including important information on the installation and configuration of MICOSec, the usage of two different kinds of application-facing interfaces,and the configuration of CORBA security for applications that do not contain any security-related modifications.
Introduction to CORBAWhy CORBA?
The Object Management Group.
The OMA.
CORBA.
How Does It All Work Together?
Further Reading: Books on CORBA.
The Security BasicsWhat Is Security?
Why Security?
Security Properties Within CORBA.
Security Management.
Threats, Vulnerabilities, and Countermeasures.
Middleware Security.
Further Reading: Books on Security.
The CORBA Security ArchitectureDesign Goals: CORBA Security Wish List.
Architectural Components.
Secure CORBA on the Internet.
Conformance.
Features or Wish List?
Further Reading: Books on CORBA Security.
Getting Started with MICOSecFree Software.
MICO.
MICOSec.
Further Reading on MICO and MICOSec.
Security Level 1Level 1 Functionality.
Level 1 Interface.
A Security-Aware Bank Application Example.
mplementation Overview and Conformance.
Further Reading.
Security Level 2Level 2 Functionality Overview.
Principal Authentication and Secure Association.
Object Domain Mapper for Access Control and Audit.
Access Control.
Security Auditing.
Delegation.
Implementation Overview and Conformance.
Further Reading.
Security-Unaware FunctionalitySecurity-Unaware Functionality Overview.
Principal Authentication and Secure Association.
Object Domain Mapping.
Security Auditing.
Delegation.
Implementation Overview and Conformance.
Further Reading.
List of Acronyms
About the Authors
Index