Skip to main content

Implementing a CORBA-Based Architecture for Leveraging the Security Level of Existing Applications

  • Conference paper
  • First Online:
On the Move to Meaningful Internet Systems 2002: CoopIS, DOA, and ODBASE (OTM 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2519))

Abstract

This work presents an implementation technique which exploits separation of concerns and reuse in a CORBA-based, multi-tier architecture to improve the security (availability, integrity, and confidentiality) level of an existing application. Functional properties are guaranteed via wrapping of the existing software modules. All security mechanisms are handled by the business logic of the middle-tier. Availability and integrity are achieved via replication of the functional modules. Confidentiality is obtained via cryptography. The technique is presented with regard to a case study application. We describe the conceptual model behind the architecture, discuss implementation issues, and present technical solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Y. Deswarte, K. Kanoun, and J. C. Laprie, “Diversity against Accidental and Deliberate faults”, in Computer Security, Dependability, and Assurance, P. Amman, B.H. Barnes, S. Jajodia, E.H. Sibley, eds, IEEE Computer Society Press, 1999

    Google Scholar 

  2. D. Atkins, et al., “Internet Security Professional Reference”. 2nd edn. New Riders Publishing, Indianapolis, 1997

    Google Scholar 

  3. J. C. Laprie, “Dependable Computing and Fault Tolerance: Concepts and Terminology”, in Proc. of 15th International Symposium on Fault Tolerant Computing, IEEE Computer Society,, pp. 2–11, Ann Arbor, MI, 1985.

    Google Scholar 

  4. Z.T. Kalbarczyk, S. Bagchi, K. Whisnant, and R.K. Iyer, “Chameleon: A software Infrastructure for Adaptive Fault Tolerance”, in IEEE Transactions on Parallel and Distributed Systems, vol.10, no.6, June 1999.

    Google Scholar 

  5. L.E. Moser, P.M. Melliar-Smith, P. Narasimhan, L. Tewksbury and V. Kalogeraki, “The Eternal System: An Architecture for Enterprise Applications”, in Proc. of International Enterprise Distributed Object Computing Conference,University of Mannheim, Germany (September 1999), pp. 214–222

    Google Scholar 

  6. K.K. Goswami, R.K. Iyer, “Simulation of Software Behavior Under Hardware Faults”, in Proc. of the 23rd Annual International Symposium on Fault-Tolerant Computing, Toulouse, France, June 1993.

    Google Scholar 

  7. John D. Howard, An Analysis of Security Incidents on the Internet 1989-1995, Apr. 1997, Pittsburgh, Pennsylvania, USA. http://www.cert.org/research/JHThesis/Start.html

  8. R. Han, D. Messerschmitt, A progressively reliable transport protocol for interactive wireless multimedia, in Multimedia Systems 7: pp. 141–156, 1999

    Google Scholar 

  9. M. Cukier et al., “AQuA: An Adaptive Architecture that Provides Dependable Distributed Objects”, in Proc. of the 17th IEEE Symposium on Reliable Distributed Systems (SRDS’98),West Lafayette, Indiana, USA, October 23, 1998, pp. 245–253.

    Google Scholar 

  10. P. Narasimhan, L. E. Moser, P.M. Melliar-Smith, “Replica Consistency of Objects in Partitionable Distributed Systems”, in Distributed Systems Engineering, vol.4, no.3, September 1997, pp. 139–150.

    Article  Google Scholar 

  11. J.C. Fabre and T. Pèrennou, “A Metaobject Architecture for Fault-Tolerant Distributed Systems: The FRIENDS Approach”,in IEEE Transactions on Computers, vol. 47, no. 1, January 1998.

    Google Scholar 

  12. P. Felber, R. Guerraoui, A. Schiper, “The Implementation of a Object Group Service”, in Theory and Practice of Object Systems (TAPOS),Wiley&Sons, Vol. 4, No. 2, 1998.

    Google Scholar 

  13. Ken Birman, Robert Constable, Mark Hayden, Christopher Kreitz, Ohad Rodeh, Robbert van Renesse, Werner Vogels,The Horus and Ensemble Projects: Accomplishments and Limitations, in Proceedings of the DARPA Information Survivability Conference & Exposition (DISCEX’ 00), January 25-27 2000 in Hilton Head, South Carolina

    Google Scholar 

  14. D.E. Bakken, Z. Zhan, C.C. Jones, D.A. Karr, Middleware Support for Voting and Data Fusion, in: The 2001 International Conference on Dependable Systems and Networks, IEEE-CS, 2001, pp. 453–462.

    Google Scholar 

  15. Institute for Applied Information Processing and Communications, March 2001 http://jcewww.iaik.tu-graz.ac.at/jce/jce.htm.

  16. IONA Technologies PLC, “Orbix 2000 SSL/TLS Programmer’s Guide”. December 2000 available on http://www.iona.com.

  17. R. Housley, W. Ford, W. Polk, D. Solo, Internet X.509 Public Key Infrastructure Certificate and CRL Profile, RFC 2459, January 1999.

    Google Scholar 

  18. IONA Technologies PLC, “Orbix 2000 Programmer’s Guide Java Edition”. December 2000 available on http://www.iona.com.

  19. National Institute of Standards and Technology: Secure Hash Standard, FIPS PUB 180-1, Federal Information Processing Standards Pubblication, 1995 (available online at http://www.itl.nist.gov/.pspubs/.ps180-1.htm)

  20. R. Rivest, The MD5 Message-Digest Algorithm, RFC 1321, MIT LCS & RSA Data Security Inc., April 1992.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cotroneo, D., Mazzeo, A., Romano, L., Russo, S. (2002). Implementing a CORBA-Based Architecture for Leveraging the Security Level of Existing Applications. In: Meersman, R., Tari, Z. (eds) On the Move to Meaningful Internet Systems 2002: CoopIS, DOA, and ODBASE. OTM 2002. Lecture Notes in Computer Science, vol 2519. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36124-3_49

Download citation

  • DOI: https://doi.org/10.1007/3-540-36124-3_49

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00106-5

  • Online ISBN: 978-3-540-36124-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics