Submission - SSP 2001 2001 IEEE Symposium on Security and Privacy 5 / 13 / 2001 - 5 / 16 / 2001 Oakland , CA USA
نویسندگان
چکیده
This paper discusses the difficulties of describing an appropriate notion of the security attributes caller and target in object-oriented middleware systems such as CORBA. Our analysis points out that, whilst there is no information available on the ORB layer to describe the caller and target, it is possible in practice to use descriptors from other layers. In CORBA security, the mechanism-specific identifiers on the caller side and the information from the object reference on the target side turn out to be most appropriate and trustworthy for describing client and target application objects at the right granularity. As a proof of concept we present our MICOSec CORBA Security implementation which demonstrates the feasibility of our approach. Our paper shows that it is unrealistic to expect a security service layer to be able to abstract fully from the underlying security mechanisms without severe implications on granularity and semantic mismatches.
منابع مشابه
A message from the program chairs
The 19 papers in these Proceedings were presented at the 2001 IEEE Symposium on Security and Privacy, held May 14-16 2001 at the Claremont Resort in Oakland, California, USA. These papers were selected from 107 submissions on all areas of computer security and privacy from authors worldwide. The selected papers were chosen on the basis of excellence of scientific contribution by a program commi...
متن کاملFormal Treatment of Certificate Revocation under Communal Access Control
The conventional approach to distributed access-control (AC) tends to be server-centric. Under this approach, each server establishes its own policy regarding the use of its resources and services by its clients. The choice of this policy, and its implementation, are generally considered the prerogative of each individual server. This approach to access-control may be appropriate for many curre...
متن کاملReflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy
This article is a retrospective of concepts and people who have contributed significantly to the IEEE Symposium on Security and Privacy over the past 30 years. • We identify many individuals who have contributed to SSP as program chairs, general chairs, and heads of the overseeing IEEE technical committee. • We recognize SSP participants who have provided significant leadership in creating and ...
متن کاملPrivacy-preserving targeted mobile advertising: requirements, design and a prototype implementation
=1884356 [last accessed 6 April 2016].19. Tufekci Z. Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin ofScience, Technology & Society 2008; 28(1):20–36.20. Madden M, Lenhart A, Cortesi S, Gasser U, Duggan M, Smith A, Beaton M. Teens, social media, and privacy. Available at: http://www.pewinternet.org/2013/05/21/teens-social-media-and-pr...
متن کاملThe IEEE Symposium on Security and Privacy, in Retrospect
T racing the history of computer security and privacy is a mammoth undertaking, somewhat resembling efforts to combine archaeology and ethnology with a compendium of past and foreseen risks— and how different courses of history might have affected those risks in different ways. (For example, the University of Minnesota’s NSF-funded collection of oral histories from influential people in this ar...
متن کامل