A Tool for Securely Integrating Legacy Systems into a Distributed Environment

نویسندگان

  • Timothy S. Souder
  • Spiros Mancoridis
چکیده

Legacy systems provide services that remain useful beyond the means of the technology in which they were originally implemented. Our Legacy Wrapper tool packages the services of a legacy application in order to redistribute as a distributed object. In this new environment, the wrapper provides its own layer of security between the security domains of the host and the distributed object system. This security layer includes a sandbox for the application that is designed to protect the application against malicious users and the host from malicious applications. In this paper we will present the Legacy Access model and the Legacy Wrapper system. The Legacy Access Model is an original system access model that presents a four tiered sandboxing model for wrapping legacy applications: complete encapsulation, shared sandbox, single sandbox, sandboxless operation. The Legacy Wrapper tool is an implementation of the model that combines wrapping an application for security purposes with wrapping it for distribution in a distributed object system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Distributed Engineering Environment for the Design of Electronic Systems

Computer supported collaborative work (CSCW) is currently of growing interest for application industrial context. Integrated workflow systems are available to allow the integration of globally distributed teams. However, in many areas (i.e. in electronic design automation), tool integration remains to be a critical issue since existing legacy tools have to be integrated into distributed workflo...

متن کامل

Mainframe-Based Legacy Integration: An Industry Project

As a computing environment evolves, heterogeneous and distributed computing environments are often unavoidable. Companies are willing to retain their legacy systems and also acquire new types of systems for their daily business operations. Rewrite, facelift and convert are three common ways to address legacy integration for use in heterogeneous and distributed computing environments. Rewrite an...

متن کامل

User Role - Based Security Model for a Distributed Environment

A distributed resource environment (DRE) allows distributed components (i.e., servers, legacy systems, databases, COTs, printers, scanners, etc.) to be treated akin to OS resources, where each component (resource) can publish services (an API), that are then available for use by clients and resources alike. DREs have lagged in support of security. To address this de ciency, this paper concentra...

متن کامل

Security Based Performance Issues in Agent-based Web Services Integrating Legacy Information Systems

Many closed internal information systems (IS) must not concern much about its security. But, nowadays, mostly due to globalization and dynamic world, business demands integration of several legacy ISs into new one. The new IS must improve its security compared to legacy ISs, because they work in the heterogeneous environment, and need to be opened. Adding security will decrease the new IS perfo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999