CORBA Firewall Security: Increasing the Security of CORBA Applications
نویسنده
چکیده
Traditional network firewalls prevent unauthorised access and attacks by protecting the points of entry into the network. Currently, however, there is no standard mechanism by which a firewall identifies and controls the flow of Internet Inter-ORB Protocol (IIOP), that has become the de-facto standard interoperability protocol for Internet providing "out-of-the-box" interoperation with ORBs, and is based on vendor-neutral transport layer. The OMG’s intention in proposing its CORBA Firewall Security is to provide a standard approach to the control of IIOP traffic through network firewalls, allowing controlled outside access to CORBA objects, thus increasing their accessibility and security. This article describes and analyses the OMG’s CORBA Firewall Security, paying special attention to such issues as the specific problems associated with it, how current firewall techniques are used to control CORBA based communication, their potential limitations and how these might be overcome, and the various aspects of firewall traversal. In addition, a possible CORBA firewall application scenario is presented. Some CORBA Firewall compliant products are emerging on the market, and this current trend in the implementation of CORBA firewall products will also be described.
منابع مشابه
Protecting the Hosted Application Server
Internet applications, are evolving from the web server to the more powerful and dynamic application server in order to support the deployment of complex applications integrated with the organization’s back end systems. A key element of the application server architecture is CORBA, the Common Object Request Broker that allows applications to communicate in a transparent and interoperable manner...
متن کاملSpecification and Enforcement of Access Control in Heterogeneous Distributed Applications
Security is a crucial aspect in any modern software system. We consider in this article the specification and the management of access control in in-house business applications which are coupled over the Internet using Web services. In-house business applications are usually built on a middleware in which security is an established aspect and security management tools are available. The integra...
متن کاملA Novel Distributed Network for Ensuring Highly Secure Proposed Enterprise Network Integrated Firewall
– A study on the current network enabled vulnerability checking software was made. It was found that most of the available solutions had a some defect or the other in implementation of the applications as there was a large delay in the assessment cycle. This was due to the inherent fact that the complete application had to scanned bit by bit and checked for byte length and code compared with th...
متن کاملSupporting Secure and Transparent Delegation in the CORBA Proxy Platform π2
π is a generic CORBA proxy platform that is used to support applications in mobile and wireless environments. π consists of two proxies which are transparently integrated into the application. Due to the broadcast characteristics of wireless communication, mobile users have very high security requirements. Since the CORBA security service as the standard approach for securing CORBA applications...
متن کاملHigh Security Web Servers and Gateways
This paper describes a high security, high perfonnance system for making legacy systems accessible to the web. It combines distributed object technology with a trusted operating system that implements multi-level security. The aim is to satisfy the growing demand for dynamic content generation, while providing a high level of protection against unauthorized access to the service. HP CORBAweb is...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000