Foreword |
|
xiii | |
Preface |
|
xv | |
Acknowledgments |
|
xvii | |
|
|
1 | (36) |
|
|
1 | (5) |
|
|
1 | (1) |
|
The Technical Perspective |
|
|
2 | (4) |
|
The Object Management Group |
|
|
6 | (1) |
|
|
7 | (7) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
9 | (4) |
|
Common Facilities and Domains |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
14 | (9) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
Static Invocation: Stubs and Skeletons |
|
|
19 | (1) |
|
Interface and Implementation Repositories |
|
|
19 | (1) |
|
Dynamic Invocation and Dispatch |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
How Does It All Work Together? |
|
|
23 | (3) |
|
The Client System at Run-Time |
|
|
24 | (2) |
|
The Server System at Run-Time |
|
|
26 | (1) |
|
|
26 | (1) |
|
Creating and Running an Example Application |
|
|
26 | (8) |
|
Writing a CORBA Application |
|
|
27 | (7) |
|
Running a CORBA Application |
|
|
34 | (1) |
|
|
34 | (1) |
|
Further Reading: Books on CORBA |
|
|
35 | (2) |
|
|
35 | (2) |
|
|
37 | (22) |
|
|
37 | (1) |
|
|
38 | (1) |
|
Security Properties Within CORBA |
|
|
39 | (4) |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
41 | (1) |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
43 | (7) |
|
|
43 | (4) |
|
|
47 | (2) |
|
Feedback: Analysis and Audit |
|
|
49 | (1) |
|
Threats, Vulnerabilities, and Countermeasures |
|
|
50 | (3) |
|
|
50 | (2) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
53 | (3) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
Further Reading: Books on Security |
|
|
57 | (2) |
|
|
57 | (2) |
|
The CORBA Security Architecture |
|
|
59 | (70) |
|
|
59 | (1) |
|
Design Goals: CORBA Security Wish List |
|
|
60 | (10) |
|
|
60 | (2) |
|
Transparency and Abstraction |
|
|
62 | (2) |
|
Flexibility, Portability, and Integration |
|
|
64 | (2) |
|
|
66 | (1) |
|
Reliability and Assurance |
|
|
67 | (2) |
|
|
69 | (1) |
|
|
70 | (38) |
|
Principals and Credentials |
|
|
70 | (2) |
|
Administration: Policies and Domains |
|
|
72 | (6) |
|
|
78 | (3) |
|
|
81 | (4) |
|
Security Context Establishment |
|
|
85 | (5) |
|
|
90 | (6) |
|
|
96 | (5) |
|
|
101 | (4) |
|
|
105 | (3) |
|
Secure CORBA on the Internet |
|
|
108 | (5) |
|
|
109 | (1) |
|
|
110 | (3) |
|
|
113 | (5) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
118 | (4) |
|
|
119 | (1) |
|
Transparency and Abstraction |
|
|
120 | (1) |
|
Flexibility, Portability, Integration |
|
|
120 | (1) |
|
|
121 | (1) |
|
Reliability and Assurance |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
122 | (4) |
|
Further Reading: Books on CORBA Security |
|
|
126 | (3) |
|
|
126 | (3) |
|
Getting Started with MICOSec |
|
|
129 | (14) |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
130 | (2) |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
132 | (8) |
|
|
133 | (1) |
|
|
134 | (6) |
|
|
140 | (1) |
|
Further Reading on MICO and MICOSec |
|
|
140 | (3) |
|
|
141 | (2) |
|
|
143 | (30) |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
145 | (2) |
|
A Security-Aware Bank Application Example |
|
|
147 | (20) |
|
Building and Running the Example |
|
|
147 | (4) |
|
SSL and X.509 Certificates |
|
|
151 | (3) |
|
|
154 | (7) |
|
|
161 | (3) |
|
|
164 | (3) |
|
Implementation Overview and Conformance |
|
|
167 | (3) |
|
|
170 | (1) |
|
|
170 | (3) |
|
|
171 | (2) |
|
|
173 | (96) |
|
|
173 | (1) |
|
Level 2 Functionality Overview |
|
|
174 | (1) |
|
Principal Authentication and Secure Association |
|
|
175 | (25) |
|
|
176 | (3) |
|
|
179 | (1) |
|
Security-Aware Bank Example: Authentication and Secure Association |
|
|
180 | (1) |
|
Building and Running the Example |
|
|
181 | (2) |
|
|
183 | (11) |
|
|
194 | (6) |
|
Object Domain Mapper for Access Control and Audit |
|
|
200 | (16) |
|
|
200 | (1) |
|
|
201 | (2) |
|
MICOSec Mapping Definition |
|
|
203 | (3) |
|
|
206 | (1) |
|
|
207 | (2) |
|
Static Per-POA Granularity |
|
|
209 | (3) |
|
|
212 | (1) |
|
|
213 | (2) |
|
Modifications to the CORBA Specification |
|
|
215 | (1) |
|
|
216 | (31) |
|
|
218 | (2) |
|
|
220 | (1) |
|
Building and Running the Example |
|
|
221 | (4) |
|
|
225 | (17) |
|
|
242 | (5) |
|
|
247 | (12) |
|
|
247 | (2) |
|
|
249 | (3) |
|
Building and Running the Example |
|
|
252 | (1) |
|
|
253 | (6) |
|
|
259 | (5) |
|
|
259 | (2) |
|
|
261 | (3) |
|
Implementation Overview and Conformance |
|
|
264 | (2) |
|
|
266 | (1) |
|
|
267 | (2) |
|
|
267 | (2) |
|
Security-Unaware Functionality |
|
|
269 | (24) |
|
|
269 | (1) |
|
Security-Unaware Functionality Overview |
|
|
270 | (1) |
|
Principal Authentication and Secure Association |
|
|
271 | (3) |
|
|
271 | (2) |
|
|
273 | (1) |
|
|
274 | (2) |
|
|
276 | (4) |
|
|
276 | (4) |
|
|
280 | (5) |
|
|
281 | (4) |
|
|
285 | (2) |
|
|
285 | (1) |
|
|
286 | (1) |
|
|
287 | (1) |
|
Implementation Overview and Conformance |
|
|
287 | (2) |
|
|
289 | (2) |
|
|
291 | (2) |
|
|
291 | (2) |
List of Acronyms |
|
293 | (6) |
About the Authors |
|
299 | (2) |
Index |
|
301 | |