Design and Implementation of a Transparent Security Infrastructure using Filter and Transformer


The Transactions of the Korea Information Processing Society (1994 ~ 2000), Vol. 5, No. 4, pp. 975-983, Apr. 1998
10.3745/KIPSTE.1998.5.4.975,   PDF Download:

Abstract

In these days, information communication systems are based on both open distributed computing technologies and object-oriented techniques like inheritance, encapsulation and object reuse to support various system configuration and application. As information systems are interconnected through unsecure networks, the need for the secure information exchange is more critical than before. In this paper, we have designed and implemented a transparent CORBA-based security infrastructure with authentication, security context association, access control and security information management to support a secure applications in distributed object environment. SESAME Ver. 4 was adopted as an external security service to manage user privilege attributes and to distribute keys for data encryption, decryption and integrity. Using filter and transformer with an interface to Object Request Broker, it provides a transparent security service to applications. The filter object are special classes that allows additional parameters to be inserted into messages before they are sent and removed just after they are received. The transformer objects are special classes that allow direct access to the byte stream of every messages for encryption and decryption before it is sent and just after it is received. This study is to implement the access control interceptor(ACI) and the secure invocation interceptor(SII) of secure ORB defined in CORBA using filter and transformer.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
K. Y. Min, L. D. Heon, N. B. Nam, C. R. Man, I. S. Ran, "Design and Implementation of a Transparent Security Infrastructure using Filter and Transformer," The Transactions of the Korea Information Processing Society (1994 ~ 2000), vol. 5, no. 4, pp. 975-983, 1998. DOI: 10.3745/KIPSTE.1998.5.4.975.

[ACM Style]
Kim Yong Min, Lee Do Heon, Noh Bong Nam, Choi Rak Man, and Ine So Ran. 1998. Design and Implementation of a Transparent Security Infrastructure using Filter and Transformer. The Transactions of the Korea Information Processing Society (1994 ~ 2000), 5, 4, (1998), 975-983. DOI: 10.3745/KIPSTE.1998.5.4.975.