Developing Secure Distributed Systems with Corba (Artech House Computer Security Series)

個数:

Developing Secure Distributed Systems with Corba (Artech House Computer Security Series)

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。
  • 製本 Hardcover:ハードカバー版/ページ数 332 p.
  • 言語 ENG
  • 商品コード 9781580532952
  • DDC分類 005.276

Full Description


This text is a clearly-written guide to building secure distributed applications with CORBA. It helps securing CORBA applications, integrating security infrastructure with CORBA applications, and evaluating the security effectiveness of distributed applications. The book provides a comprehensive study of the CORBA security architecture, allowing for a better understanding of its goals and limitations. It is designed to serve as a complete reference for understanding security in distributed systems. The book also illustrates the usage of the MICOSec CORBA security services implementation, including important information on the installation and configuration of MICOSec, the usage of two different kinds of application-facing interfaces, and the configuration of CORBA security for applications that do not contain any security-related modifications.

Table of Contents

Foreword                                           xiii
Preface xv
Acknowledgments xvii
Introduction to CORBA 1 (36)
Why CORBA? 1 (5)
The Business Perspective 1 (1)
The Technical Perspective 2 (4)
The Object Management Group 6 (1)
The OMA 7 (7)
Introduction 7 (1)
ORB 8 (1)
Object Services 9 (4)
Common Facilities and Domains 13 (1)
Application Interfaces 13 (1)
Object Frameworks 14 (1)
CORBA 14 (9)
ORB Core 15 (1)
Object References 16 (1)
OMG IDL 17 (1)
Language Mappings 18 (1)
Static Invocation: Stubs and Skeletons 19 (1)
Interface and Implementation Repositories 19 (1)
Dynamic Invocation and Dispatch 20 (1)
Object Adapters 21 (1)
Inter-ORB Protocols 22 (1)
How Does It All Work Together? 23 (3)
The Client System at Run-Time 24 (2)
The Server System at Run-Time 26 (1)
Other Components 26 (1)
Creating and Running an Example Application 26 (8)
Writing a CORBA Application 27 (7)
Running a CORBA Application 34 (1)
Summary 34 (1)
Further Reading: Books on CORBA 35 (2)
References 35 (2)
The Security Basics 37 (22)
What Is Security? 37 (1)
Why Security? 38 (1)
Security Properties Within CORBA 39 (4)
Confidentiality 40 (1)
Integrity 41 (1)
Availability 41 (1)
Accountability 42 (1)
Dependability 42 (1)
Security Management 43 (7)
Security Policy 43 (4)
Risk Analysis 47 (2)
Feedback: Analysis and Audit 49 (1)
Threats, Vulnerabilities, and 50 (3)
Countermeasures
Threats 50 (2)
Vulnerabilities 52 (1)
Countermeasures 53 (1)
Middleware Security 53 (3)
Mutual Distrust 54 (1)
Dynamic Interactions 54 (1)
Scalability 55 (1)
Layers of Abstraction 55 (1)
Summary 56 (1)
Further Reading: Books on Security 57 (2)
References 57 (2)
The CORBA Security Architecture 59 (70)
Introduction 59 (1)
Design Goals: CORBA Security Wish List 60 (10)
Interoperability 60 (2)
Transparency and Abstraction 62 (2)
Flexibility, Portability, and Integration 64 (2)
Scalability 66 (1)
Reliability and Assurance 67 (2)
Simplicity 69 (1)
Architectural Components 70 (38)
Principals and Credentials 70 (2)
Administration: Policies and Domains 72 (6)
Privilege Delegation 78 (3)
Principal Authentication 81 (4)
Security Context Establishment 85 (5)
Message Protection 90 (6)
Access Control 96 (5)
Security Audit 101 (4)
Nonrepudiation 105 (3)
Secure CORBA on the Internet 108 (5)
SSL/TLS 109 (1)
Firewalls 110 (3)
Conformance 113 (5)
Level 1 Security 114 (1)
Level 2 Security 115 (1)
Nonrepudiation Option 116 (1)
Security Replaceability 116 (1)
CSI 117 (1)
Features or Wish List? 118 (4)
Interoperability 119 (1)
Transparency and Abstraction 120 (1)
Flexibility, Portability, Integration 120 (1)
Scalability 121 (1)
Reliability and Assurance 121 (1)
Simplicity 121 (1)
Summary 122 (4)
Further Reading: Books on CORBA Security 126 (3)
References 126 (3)
Getting Started with MICOSec 129 (14)
Introduction 129 (1)
Free Software 129 (1)
MICO 130 (2)
Overview 130 (1)
Installation 131 (1)
MICOSec 132 (8)
Overview 133 (1)
Installation 134 (6)
Summary 140 (1)
Further Reading on MICO and MICOSec 140 (3)
References 141 (2)
Security Level 1 143 (30)
Introduction 143 (1)
Level 1 Functionality 144 (1)
Level 1 Interface 145 (2)
A Security-Aware Bank Application Example 147 (20)
Building and Running the Example 147 (4)
SSL and X.509 Certificates 151 (3)
The Target 154 (7)
Security Attributes 161 (3)
The Client 164 (3)
Implementation Overview and Conformance 167 (3)
Summary 170 (1)
Further Reading 170 (3)
References 171 (2)
Security Level 2 173 (96)
Introduction 173 (1)
Level 2 Functionality Overview 174 (1)
Principal Authentication and Secure 175 (25)
Association
Principal Authentication 176 (3)
Secure Association 179 (1)
Security-Aware Bank Example: 180 (1)
Authentication and Secure Association
Building and Running the Example 181 (2)
The Target 183 (11)
The Client 194 (6)
Object Domain Mapper for Access Control and 200 (16)
Audit
Introduction 200 (1)
Mapping Information 201 (2)
MICOSec Mapping Definition 203 (3)
Mapping Process 206 (1)
ODM Interfaces 207 (2)
Static Per-POA Granularity 209 (3)
Per-Object Granularity 212 (1)
Dynamic Configuration 213 (2)
Modifications to the CORBA Specification 215 (1)
Access Control 216 (31)
Interfaces 218 (2)
The Bank Example 220 (1)
Building and Running the Example 221 (4)
The Target 225 (17)
Client-Side Code Example 242 (5)
Security Auditing 247 (12)
Audit Interfaces 247 (2)
Audit Filtering Policies 249 (3)
Building and Running the Example 252 (1)
Target Example 253 (6)
Delegation 259 (5)
Overview 259 (2)
Delegation Mechanisms 261 (3)
Implementation Overview and Conformance 264 (2)
Summary 266 (1)
Further Reading 267 (2)
References 267 (2)
Security-Unaware Functionality 269 (24)
Introduction 269 (1)
Security-Unaware Functionality Overview 270 (1)
Principal Authentication and Secure 271 (3)
Association
Command Line Arguments 271 (2)
Example Configuration 273 (1)
Object Domain Mapping 274 (2)
Access Control 276 (4)
Bank Example 276 (4)
Security Auditing 280 (5)
Example Configuration 281 (4)
Delegation 285 (2)
Overview 285 (1)
SSL and Delegation 286 (1)
CSIv2-SAS Delegation 287 (1)
Implementation Overview and Conformance 287 (2)
Summary 289 (2)
Further Reading 291 (2)
References 291 (2)
List of Acronyms 293 (6)
About the Authors 299 (2)
Index 301