Atjaunināt sīkdatņu piekrišanu

E-grāmata: Developing Secure Distributed Systems with CORBA

  • Formāts: 332 pages
  • Izdošanas datums: 31-Jan-2001
  • Izdevniecība: Artech House Publishers
  • ISBN-13: 9781580535618
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 57,48 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: 332 pages
  • Izdošanas datums: 31-Jan-2001
  • Izdevniecība: Artech House Publishers
  • ISBN-13: 9781580535618
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This text is a clearly-written guide to building secure distributed applications with CORBA. It helps securing CORBA applications, integrating security infrastructure with CORBA applications, and evaluating the security effectiveness of distributed applications. The book provides a comprehensive study of the CORBA security architecture, allowing for a better understanding of its goals and limitations. It is designed to serve as a complete reference for understanding security in distributed systems. The book also illustrates the usage of the MICOSec CORBA security services implementation, including important information on the installation and configuration of MICOSec, the usage of two different kinds of application-facing interfaces, and the configuration of CORBA security for applications that do not contain any security-related modifications.
Foreword xiii
Preface xv
Acknowledgments xvii
Introduction to CORBA
1(36)
Why CORBA?
1(5)
The Business Perspective
1(1)
The Technical Perspective
2(4)
The Object Management Group
6(1)
The OMA
7(7)
Introduction
7(1)
ORB
8(1)
Object Services
9(4)
Common Facilities and Domains
13(1)
Application Interfaces
13(1)
Object Frameworks
14(1)
CORBA
14(9)
ORB Core
15(1)
Object References
16(1)
OMG IDL
17(1)
Language Mappings
18(1)
Static Invocation: Stubs and Skeletons
19(1)
Interface and Implementation Repositories
19(1)
Dynamic Invocation and Dispatch
20(1)
Object Adapters
21(1)
Inter-ORB Protocols
22(1)
How Does It All Work Together?
23(3)
The Client System at Run-Time
24(2)
The Server System at Run-Time
26(1)
Other Components
26(1)
Creating and Running an Example Application
26(8)
Writing a CORBA Application
27(7)
Running a CORBA Application
34(1)
Summary
34(1)
Further Reading: Books on CORBA
35(2)
References
35(2)
The Security Basics
37(22)
What Is Security?
37(1)
Why Security?
38(1)
Security Properties Within CORBA
39(4)
Confidentiality
40(1)
Integrity
41(1)
Availability
41(1)
Accountability
42(1)
Dependability
42(1)
Security Management
43(7)
Security Policy
43(4)
Risk Analysis
47(2)
Feedback: Analysis and Audit
49(1)
Threats, Vulnerabilities, and Countermeasures
50(3)
Threats
50(2)
Vulnerabilities
52(1)
Countermeasures
53(1)
Middleware Security
53(3)
Mutual Distrust
54(1)
Dynamic Interactions
54(1)
Scalability
55(1)
Layers of Abstraction
55(1)
Summary
56(1)
Further Reading: Books on Security
57(2)
References
57(2)
The CORBA Security Architecture
59(70)
Introduction
59(1)
Design Goals: CORBA Security Wish List
60(10)
Interoperability
60(2)
Transparency and Abstraction
62(2)
Flexibility, Portability, and Integration
64(2)
Scalability
66(1)
Reliability and Assurance
67(2)
Simplicity
69(1)
Architectural Components
70(38)
Principals and Credentials
70(2)
Administration: Policies and Domains
72(6)
Privilege Delegation
78(3)
Principal Authentication
81(4)
Security Context Establishment
85(5)
Message Protection
90(6)
Access Control
96(5)
Security Audit
101(4)
Nonrepudiation
105(3)
Secure CORBA on the Internet
108(5)
SSL/TLS
109(1)
Firewalls
110(3)
Conformance
113(5)
Level 1 Security
114(1)
Level 2 Security
115(1)
Nonrepudiation Option
116(1)
Security Replaceability
116(1)
CSI
117(1)
Features or Wish List?
118(4)
Interoperability
119(1)
Transparency and Abstraction
120(1)
Flexibility, Portability, Integration
120(1)
Scalability
121(1)
Reliability and Assurance
121(1)
Simplicity
121(1)
Summary
122(4)
Further Reading: Books on CORBA Security
126(3)
References
126(3)
Getting Started with MICOSec
129(14)
Introduction
129(1)
Free Software
129(1)
MICO
130(2)
Overview
130(1)
Installation
131(1)
MICOSec
132(8)
Overview
133(1)
Installation
134(6)
Summary
140(1)
Further Reading on MICO and MICOSec
140(3)
References
141(2)
Security Level 1
143(30)
Introduction
143(1)
Level 1 Functionality
144(1)
Level 1 Interface
145(2)
A Security-Aware Bank Application Example
147(20)
Building and Running the Example
147(4)
SSL and X.509 Certificates
151(3)
The Target
154(7)
Security Attributes
161(3)
The Client
164(3)
Implementation Overview and Conformance
167(3)
Summary
170(1)
Further Reading
170(3)
References
171(2)
Security Level 2
173(96)
Introduction
173(1)
Level 2 Functionality Overview
174(1)
Principal Authentication and Secure Association
175(25)
Principal Authentication
176(3)
Secure Association
179(1)
Security-Aware Bank Example: Authentication and Secure Association
180(1)
Building and Running the Example
181(2)
The Target
183(11)
The Client
194(6)
Object Domain Mapper for Access Control and Audit
200(16)
Introduction
200(1)
Mapping Information
201(2)
MICOSec Mapping Definition
203(3)
Mapping Process
206(1)
ODM Interfaces
207(2)
Static Per-POA Granularity
209(3)
Per-Object Granularity
212(1)
Dynamic Configuration
213(2)
Modifications to the CORBA Specification
215(1)
Access Control
216(31)
Interfaces
218(2)
The Bank Example
220(1)
Building and Running the Example
221(4)
The Target
225(17)
Client-Side Code Example
242(5)
Security Auditing
247(12)
Audit Interfaces
247(2)
Audit Filtering Policies
249(3)
Building and Running the Example
252(1)
Target Example
253(6)
Delegation
259(5)
Overview
259(2)
Delegation Mechanisms
261(3)
Implementation Overview and Conformance
264(2)
Summary
266(1)
Further Reading
267(2)
References
267(2)
Security-Unaware Functionality
269(24)
Introduction
269(1)
Security-Unaware Functionality Overview
270(1)
Principal Authentication and Secure Association
271(3)
Command Line Arguments
271(2)
Example Configuration
273(1)
Object Domain Mapping
274(2)
Access Control
276(4)
Bank Example
276(4)
Security Auditing
280(5)
Example Configuration
281(4)
Delegation
285(2)
Overview
285(1)
SSL and Delegation
286(1)
CSIv2-SAS Delegation
287(1)
Implementation Overview and Conformance
287(2)
Summary
289(2)
Further Reading
291(2)
References
291(2)
List of Acronyms 293(6)
About the Authors 299(2)
Index 301


Ulrich Lang, a researcher at the University of Cambridge Computer Laboratory, co-founder and Research Director of ObjectSecurity Ltd., received his M.Sc. in Information Security from Royal Holloway College, at the University of London. Before that, he studied computer science with management at the Ludwig-Maximilians-Universitat in Munich, Germany. Rudolf Schreiner, co-founder and Chief Technology Officer of ObjectSecurity Ltd., a consultancy specialized in distributed systems security, received his Dipl.-Phys. from Ludwig-Maximilians-Universitat in Munich (Germany) in 1993. Before his career at ObjectSecurity Ltd., he worked as a freelance programmer and consultant on various computer security projects.