This work presents an implementation technique which exploits separation of concerns and reuse in a CORBA-based, multi-tier architecture to improve the security (availability, integrity, and confidentiality) level of an existing application. Functional properties are guaranteed via wrapping of the existing software modules. All security mechanisms are handled by the business logic of the middle-tier. Availability and integrity are achieved via replication of the functional modules. Confidentiality is obtained via cryptography. The technique is presented with regard to a case study application. We describe the conceptual model behind the architecture, discuss implementation issues, and present technical solutions. © Springer-Verlag Berlin Heidelberg 2002.
CITATION STYLE
Cotroneo, D., Mazzeo, A., Romano, L., & Russo, S. (2002). Implementing a CORBA-based architecture for leveraging the security level of existing applications. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2519 LNCS, pp. 723–736). Springer Verlag. https://doi.org/10.1007/3-540-36124-3_49
Mendeley helps you to discover research relevant for your work.