Implementing a CORBA-based architecture for leveraging the security level of existing applications

N/ACitations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This work presents an implementation technique which exploits separation of concerns and reuse in a CORBA-based, multi-tier architecture to improve the security (availability, integrity, and confidentiality) level of an existing application. Functional properties are guaranteed via wrapping of the existing software modules. All security mechanisms are handled by the business logic of the middle-tier. Availability and integrity are achieved via replication of the functional modules. Confidentiality is obtained via cryptography. The technique is presented with regard to a case study application. We describe the conceptual model behind the architecture, discuss implementation issues, and present technical solutions. © Springer-Verlag Berlin Heidelberg 2002.

Cite

CITATION STYLE

APA

Cotroneo, D., Mazzeo, A., Romano, L., & Russo, S. (2002). Implementing a CORBA-based architecture for leveraging the security level of existing applications. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2519 LNCS, pp. 723–736). Springer Verlag. https://doi.org/10.1007/3-540-36124-3_49

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free