CORBA Security Service - PowerPoint PPT Presentation

About This Presentation
Title:

CORBA Security Service

Description:

Security control bypassed. Eaves dropping on communication line. ... Security of communication and message passing. Object invocation Access Control. Security Auditing ... – PowerPoint PPT presentation

Number of Views:34
Avg rating:3.0/5.0
Slides: 16
Provided by: dam74
Learn more at: https://www.cs.odu.edu
Category:

less

Transcript and Presenter's Notes

Title: CORBA Security Service


1
CORBA Security Service
  • Presented by Srihari Dammalapati

2
What is Security
  • Protection of information against unauthorized
    attempts to access or interfere with its
    operation.
  • Confidentiality
  • Integrity
  • Accountability
  • Availability

3
Threats in a Distributed System
  • Gaining access to information that should be
    hidden from the user
  • A user pretending as other user and getting
    access controls of the other user
  • Security control bypassed
  • Eaves dropping on communication line.
  • Tampering with communication between objects
  • Lack of accountability.

4
Key Security Features
  • Identification, authentication and privileges
  • Security of communication and message passing
  • Object invocation Access Control
  • Security Auditing
  • Delegation
  • Security Management and Administration

5
Structure of OMA

CORBA facilities
Application objects
Vertical facilities
Horizontal facilities
Business Objects Healthcare Finance Telecommunicat
ion
Compound Docs Object Linking Help
Facilities Desktop Mgmt
Object Request Broker (Software Bus)
Life Cycle Naming Transactions Concurrency Securi
ty persistence
Object services
6
ORB ARCHITECTURE
7
Authentication,Identity and privilege
  • Identifying an principal
  • Principal is a human user or system entity that
    is registered in and to the system.
  • Set of attributes are associated with the
    principal
  • It may have different identity attribute for each
    use or single attribute for all uses
  • privileged attributes provide the basis for
    access decisions within CORBA Security Service.

8
The CORBA Security Service Authentication Architec
ture
9
Security Communication and Message passing
  • Identification and authentication of client to
    object and object to client
  • Protected transfer of credentials
  • Negotiate the protection in transfer of the
    message that is acceptable to both client and
    object

10
Object Invocation Access Control
  • Client, acting on behalf of current principal can
    access this target object.
  • Object invocation policy is encapsulated by
    Access Decision Functions.
  • Target side access decision or client side or
    both.

11
Security Auditing
  • Security relevant events should be identified
    for auditing.
  • Two categories of audit policies
  • Auditing of ORB and CORBA Security Service events
  • Application audit policies which control the
    auditing of events that occur at boundary
    conditions

12
Delegation
  • The access control passes through chain of
    objects
  • No delegation, the intermediate object only uses
    its privileges.
  • Intermediate object uses the intiating
    principals privilege
  • combined privilege delegation
  • composite delegation
  • traced delegation

13
Security Management and Administration
  • Domain - a distinct scope, with which certain
    common characteristics are exhibited and common
    rules observed.
  • Security policy domain
  • Security technology domain
  • Security environment domain
  • Managing the security policy domains
  • Managing member or objects of domains
  • Managing the policies enforced within each domain.

14
Conclusions
  • CORBA security service is flexible enough to
    support wide variety of security policies
  • It is a complex architecture
  • The specifications seems to be not completed.

15
References
  • CORBA security service
  • ftp//ftp.omg.org/pub/docs/ptc/98-01-02.pdf
  • www.itsecurity.com/corba/corbasec.htm
Write a Comment
User Comments (0)
About PowerShow.com