The Internet Inter-Orb Protocol Security Bridge
In this paper, we present a security bridge for the Internet protocol of interoperability amongst CORBA objects and the Internet inter-ORB Protocol (IIOP). The bridge helps in making accessible objects in the Internet and makes possible the access control to them. The bridge was realized in the popu...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
AGH University of Science and Technology Press
1999-01-01
|
Series: | Computer Science |
Subjects: | |
Online Access: | http://www.csci.agh.edu.pl/19/1/cs1999%2D07.pdf |
id |
doaj-60d1aed29d534a16a2855928bb5a1115 |
---|---|
record_format |
Article |
spelling |
doaj-60d1aed29d534a16a2855928bb5a11152020-11-24T20:48:08ZengAGH University of Science and Technology PressComputer Science1508-28061999-01-0111161179The Internet Inter-Orb Protocol Security BridgePawel SlowikowskiPawel PietrasIn this paper, we present a security bridge for the Internet protocol of interoperability amongst CORBA objects and the Internet inter-ORB Protocol (IIOP). The bridge helps in making accessible objects in the Internet and makes possible the access control to them. The bridge was realized in the popular request broker the Visigenic's VisiBroker under Windows 95/NT and Solaris 2.X operating systems. We describe two ways of locating the bridge in the request broker. The first means uses one name domain of broker and is not transparent for client. The second one uses two name domains and provides objects protection on the level of the Naming Service and is transparent lor the client. We also describe the variant ofthe second means with using GateKeeper server to support IIOP tunneling within HTTP. We emphasize the importance of a firewall, cooperating with a bridge. which is required for the purpose of providing object protection. The paper presents an original conception of security managing, basing on the ideas of users, groups and resources defined using the standard terms of CORBA, IIOP and TCP/IP, that allows to control positively and negatively the access to classes (interfaces), objects and also to their individual methods. This conception was effectively implemented in a functioning bridge. Further chapters describe the foundations and some details of the bridge implementation sueli as the use ofthe Interface Repository, cache memory application, thread synchronization and the way of synchronization of the configuration applet with the bridge's objects. We discuss the influence of these solutions on the efficiency ofthe bridge and its source code portability. We also present the general structure of the component objects ofthe bridge with a scheme. ln the next part we characterize the implementation foundations ofthe bridge manager, realized as an applet in Java, with the stress on the possibility of the bridge configuration through the network. Later, we describe the functionality ofthe bridge manager, which allows the configuration of all the important parameters ofthe bridge and of the security management. The next chapter discusses the conclusions l`roin the eflieiency tests ofthe two main bridge layers the bridge manager and the bridge (proxy mechanism), the influence of the usage memory caching on its efficiency. We provide there also an overall evaluation of the obtained results The last chapter includes a summary and discusses the bridge advantages and limitations as well as its evolution possibilities. http://www.csci.agh.edu.pl/19/1/cs1999%2D07.pdfDistributed and grid systems |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Pawel Slowikowski Pawel Pietras |
spellingShingle |
Pawel Slowikowski Pawel Pietras The Internet Inter-Orb Protocol Security Bridge Computer Science Distributed and grid systems |
author_facet |
Pawel Slowikowski Pawel Pietras |
author_sort |
Pawel Slowikowski |
title |
The Internet Inter-Orb Protocol Security Bridge |
title_short |
The Internet Inter-Orb Protocol Security Bridge |
title_full |
The Internet Inter-Orb Protocol Security Bridge |
title_fullStr |
The Internet Inter-Orb Protocol Security Bridge |
title_full_unstemmed |
The Internet Inter-Orb Protocol Security Bridge |
title_sort |
internet inter-orb protocol security bridge |
publisher |
AGH University of Science and Technology Press |
series |
Computer Science |
issn |
1508-2806 |
publishDate |
1999-01-01 |
description |
In this paper, we present a security bridge for the Internet protocol of interoperability amongst CORBA objects and the Internet inter-ORB Protocol (IIOP). The bridge helps in making accessible objects in the Internet and makes possible the access control to them. The bridge was realized in the popular request broker the Visigenic's VisiBroker under Windows 95/NT and Solaris 2.X operating systems. We describe two ways of locating the bridge in the request broker. The first means uses one name domain of broker and is not transparent for client. The second one uses two name domains and provides objects protection on the level of the Naming Service and is transparent lor the client. We also describe the variant ofthe second means with using GateKeeper server to support IIOP tunneling within HTTP. We emphasize the importance of a firewall, cooperating with a bridge. which is required for the purpose of providing object protection. The paper presents an original conception of security managing, basing on the ideas of users, groups and resources defined using the standard terms of CORBA, IIOP and TCP/IP, that allows to control positively and negatively the access to classes (interfaces), objects and also to their individual methods. This conception was effectively implemented in a functioning bridge. Further chapters describe the foundations and some details of the bridge implementation sueli as the use ofthe Interface Repository, cache memory application, thread synchronization and the way of synchronization of the configuration applet with the bridge's objects. We discuss the influence of these solutions on the efficiency ofthe bridge and its source code portability. We also present the general structure of the component objects ofthe bridge with a scheme. ln the next part we characterize the implementation foundations ofthe bridge manager, realized as an applet in Java, with the stress on the possibility of the bridge configuration through the network. Later, we describe the functionality ofthe bridge manager, which allows the configuration of all the important parameters ofthe bridge and of the security management. The next chapter discusses the conclusions l`roin the eflieiency tests ofthe two main bridge layers the bridge manager and the bridge (proxy mechanism), the influence of the usage memory caching on its efficiency. We provide there also an overall evaluation of the obtained results The last chapter includes a summary and discusses the bridge advantages and limitations as well as its evolution possibilities. |
topic |
Distributed and grid systems |
url |
http://www.csci.agh.edu.pl/19/1/cs1999%2D07.pdf |
work_keys_str_mv |
AT pawelslowikowski theinternetinterorbprotocolsecuritybridge AT pawelpietras theinternetinterorbprotocolsecuritybridge AT pawelslowikowski internetinterorbprotocolsecuritybridge AT pawelpietras internetinterorbprotocolsecuritybridge |
_version_ |
1716808835688038400 |