Submission - SSP 2001 2001 IEEE Symposium on Security and Privacy 5 / 13 / 2001 - 5 / 16 / 2001 Oakland , CA USA

نویسندگان

  • Ulrich Lang
  • Dieter Gollmann
  • Rudolf Schreiner
چکیده

This paper discusses the difficulties of describing an appropriate notion of the security attributes caller and target in object-oriented middleware systems such as CORBA. Our analysis points out that, whilst there is no information available on the ORB layer to describe the caller and target, it is possible in practice to use descriptors from other layers. In CORBA security, the mechanism-specific identifiers on the caller side and the information from the object reference on the target side turn out to be most appropriate and trustworthy for describing client and target application objects at the right granularity. As a proof of concept we present our MICOSec CORBA Security implementation which demonstrates the feasibility of our approach. Our paper shows that it is unrealistic to expect a security service layer to be able to abstract fully from the underlying security mechanisms without severe implications on granularity and semantic mismatches.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A message from the program chairs

The 19 papers in these Proceedings were presented at the 2001 IEEE Symposium on Security and Privacy, held May 14-16 2001 at the Claremont Resort in Oakland, California, USA. These papers were selected from 107 submissions on all areas of computer security and privacy from authors worldwide. The selected papers were chosen on the basis of excellence of scientific contribution by a program commi...

متن کامل

Formal Treatment of Certificate Revocation under Communal Access Control

The conventional approach to distributed access-control (AC) tends to be server-centric. Under this approach, each server establishes its own policy regarding the use of its resources and services by its clients. The choice of this policy, and its implementation, are generally considered the prerogative of each individual server. This approach to access-control may be appropriate for many curre...

متن کامل

Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy

This article is a retrospective of concepts and people who have contributed significantly to the IEEE Symposium on Security and Privacy over the past 30 years. • We identify many individuals who have contributed to SSP as program chairs, general chairs, and heads of the overseeing IEEE technical committee. • We recognize SSP participants who have provided significant leadership in creating and ...

متن کامل

Privacy-preserving targeted mobile advertising: requirements, design and a prototype implementation

=1884356 [last accessed 6 April 2016].19. Tufekci Z. Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin ofScience, Technology & Society 2008; 28(1):20–36.20. Madden M, Lenhart A, Cortesi S, Gasser U, Duggan M, Smith A, Beaton M. Teens, social media, and privacy. Available at: http://www.pewinternet.org/2013/05/21/teens-social-media-and-pr...

متن کامل

The IEEE Symposium on Security and Privacy, in Retrospect

T racing the history of computer security and privacy is a mammoth undertaking, somewhat resembling efforts to combine archaeology and ethnology with a compendium of past and foreseen risks— and how different courses of history might have affected those risks in different ways. (For example, the University of Minnesota’s NSF-funded collection of oral histories from influential people in this ar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001