The Internet Inter-Orb Protocol Security Bridge

In this paper, we present a security bridge for the Internet protocol of interoperability amongst CORBA objects and the Internet inter-ORB Protocol (IIOP). The bridge helps in making accessible objects in the Internet and makes possible the access control to them. The bridge was realized in the popu...

Full description

Bibliographic Details
Main Authors: Pawel Slowikowski, Pawel Pietras
Format: Article
Language:English
Published: AGH University of Science and Technology Press 1999-01-01
Series:Computer Science
Subjects:
Online Access:http://www.csci.agh.edu.pl/19/1/cs1999%2D07.pdf
id doaj-60d1aed29d534a16a2855928bb5a1115
record_format Article
spelling doaj-60d1aed29d534a16a2855928bb5a11152020-11-24T20:48:08ZengAGH University of Science and Technology PressComputer Science1508-28061999-01-0111161179The Internet Inter-Orb Protocol Security BridgePawel SlowikowskiPawel PietrasIn this paper, we present a security bridge for the Internet protocol of interoperability amongst CORBA objects and the Internet inter-ORB Protocol (IIOP). The bridge helps in making accessible objects in the Internet and makes possible the access control to them. The bridge was realized in the popular request broker the Visigenic's VisiBroker under Windows 95/NT and Solaris 2.X operating systems. We describe two ways of locating the bridge in the request broker. The first means uses one name domain of broker and is not transparent for client. The second one uses two name domains and provides objects protection on the level of the Naming Service and is transparent lor the client. We also describe the variant ofthe second means with using GateKeeper server to support IIOP tunneling within HTTP. We emphasize the importance of a firewall, cooperating with a bridge. which is required for the purpose of providing object protection. The paper presents an original conception of security managing, basing on the ideas of users, groups and resources defined using the standard terms of CORBA, IIOP and TCP/IP, that allows to control positively and negatively the access to classes (interfaces), objects and also to their individual methods. This conception was effectively implemented in a functioning bridge. Further chapters describe the foundations and some details of the bridge implementation sueli as the use ofthe Interface Repository, cache memory application, thread synchronization and the way of synchronization of the configuration applet with the bridge's objects. We discuss the influence of these solutions on the efficiency ofthe bridge and its source code portability. We also present the general structure of the component objects ofthe bridge with a scheme. ln the next part we characterize the implementation foundations ofthe bridge manager, realized as an applet in Java, with the stress on the possibility of the bridge configuration through the network. Later, we describe the functionality ofthe bridge manager, which allows the configuration of all the important parameters ofthe bridge and of the security management. The next chapter discusses the conclusions l`roin the eflieiency tests ofthe two main bridge layers the bridge manager and the bridge (proxy mechanism), the influence of the usage memory caching on its efficiency. We provide there also an overall evaluation of the obtained results The last chapter includes a summary and discusses the bridge advantages and limitations as well as its evolution possibilities. http://www.csci.agh.edu.pl/19/1/cs1999%2D07.pdfDistributed and grid systems
collection DOAJ
language English
format Article
sources DOAJ
author Pawel Slowikowski
Pawel Pietras
spellingShingle Pawel Slowikowski
Pawel Pietras
The Internet Inter-Orb Protocol Security Bridge
Computer Science
Distributed and grid systems
author_facet Pawel Slowikowski
Pawel Pietras
author_sort Pawel Slowikowski
title The Internet Inter-Orb Protocol Security Bridge
title_short The Internet Inter-Orb Protocol Security Bridge
title_full The Internet Inter-Orb Protocol Security Bridge
title_fullStr The Internet Inter-Orb Protocol Security Bridge
title_full_unstemmed The Internet Inter-Orb Protocol Security Bridge
title_sort internet inter-orb protocol security bridge
publisher AGH University of Science and Technology Press
series Computer Science
issn 1508-2806
publishDate 1999-01-01
description In this paper, we present a security bridge for the Internet protocol of interoperability amongst CORBA objects and the Internet inter-ORB Protocol (IIOP). The bridge helps in making accessible objects in the Internet and makes possible the access control to them. The bridge was realized in the popular request broker the Visigenic's VisiBroker under Windows 95/NT and Solaris 2.X operating systems. We describe two ways of locating the bridge in the request broker. The first means uses one name domain of broker and is not transparent for client. The second one uses two name domains and provides objects protection on the level of the Naming Service and is transparent lor the client. We also describe the variant ofthe second means with using GateKeeper server to support IIOP tunneling within HTTP. We emphasize the importance of a firewall, cooperating with a bridge. which is required for the purpose of providing object protection. The paper presents an original conception of security managing, basing on the ideas of users, groups and resources defined using the standard terms of CORBA, IIOP and TCP/IP, that allows to control positively and negatively the access to classes (interfaces), objects and also to their individual methods. This conception was effectively implemented in a functioning bridge. Further chapters describe the foundations and some details of the bridge implementation sueli as the use ofthe Interface Repository, cache memory application, thread synchronization and the way of synchronization of the configuration applet with the bridge's objects. We discuss the influence of these solutions on the efficiency ofthe bridge and its source code portability. We also present the general structure of the component objects ofthe bridge with a scheme. ln the next part we characterize the implementation foundations ofthe bridge manager, realized as an applet in Java, with the stress on the possibility of the bridge configuration through the network. Later, we describe the functionality ofthe bridge manager, which allows the configuration of all the important parameters ofthe bridge and of the security management. The next chapter discusses the conclusions l`roin the eflieiency tests ofthe two main bridge layers the bridge manager and the bridge (proxy mechanism), the influence of the usage memory caching on its efficiency. We provide there also an overall evaluation of the obtained results The last chapter includes a summary and discusses the bridge advantages and limitations as well as its evolution possibilities.
topic Distributed and grid systems
url http://www.csci.agh.edu.pl/19/1/cs1999%2D07.pdf
work_keys_str_mv AT pawelslowikowski theinternetinterorbprotocolsecuritybridge
AT pawelpietras theinternetinterorbprotocolsecuritybridge
AT pawelslowikowski internetinterorbprotocolsecuritybridge
AT pawelpietras internetinterorbprotocolsecuritybridge
_version_ 1716808835688038400