Enterprise Security with EJB and CORBA

Overview

Building secure applications using the most popular component technologies

Did you know that most corporate computer security breaches are inside jobs by trusted employees? This book addresses the need in the era of multi-tier systems to implement security solutions across all enterprise applications, not just firewalls that target intrusion from the outside. With nationally recognized CORBA security expert Bret Hartman at the helm, this book shows application developers how to ...

See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (7) from $1.99   
  • New (1) from $105.00   
  • Used (6) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$105.00
Seller since 2014

Feedback rating:

(164)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

Building secure applications using the most popular component technologies

Did you know that most corporate computer security breaches are inside jobs by trusted employees? This book addresses the need in the era of multi-tier systems to implement security solutions across all enterprise applications, not just firewalls that target intrusion from the outside. With nationally recognized CORBA security expert Bret Hartman at the helm, this book shows application developers how to build secure, real-world applications that deliver tightly integrated security at all system levels using the latest component technologies and tools. Coverage also includes a sample e-commerce system built using Java with EJB and CORBA as well as case studies of implementations in finance, manufacturing, and telecom.

Read More Show Less

Editorial Reviews

From The Critics
Presents techniques for building secure e-commerce applications using Enterprise JavaBeans (EJB) and Common Object Request Broker Architecture (CORBA). The authors describe the contents of the relevant specifications and explain how to write the proper code for the specifications. They also address the important concern of the interoperability of EJB and CORBA applications. Annotation c. Book News, Inc., Portland, OR (booknews.com)
Read More Show Less

Product Details

  • ISBN-13: 9780471401315
  • Publisher: Wiley
  • Publication date: 4/6/2001
  • Series: OMG Series , #15
  • Edition number: 1
  • Pages: 400
  • Product dimensions: 7.51 (w) x 9.23 (h) x 0.91 (d)

Meet the Author

Bret Hartman, nationally recognized expert on CORBA security, is Chief Technology Officer of the Hitachi Security Software Unit. He is a regular speaker and expert panelist on secure distributed systems and CORBA security.

Donlad J. Flinn is a security architect at IONA Technologies with over 25 years' experience in distributed object systems, including CORBA and Java security. He is chair of the Security SIG at the Object Management Group.

Read More Show Less

Read an Excerpt

Chapter 1: An Overview of Enterprise Security Integration

This chapter explores groundbreaking technology that supports rapid deployment of secure e-business applications. This technology, based on the integration of distributed component computing and information security, represents new power to mount secure, scalable e-business services. We begin by discussing the basic relationship between security and components. We then describe how security enables new e-business applications that were not previously feasible and how e-business solutions create new security responsibilities. Next, we describe the many challenges of enforcing security in component-based applications. Finally, we introduce Enterprise Security Integration (ESI), which we use to tie together many different security technologies, and as a result, provide the framework for building secure component architectures.

Components and Security

Application servers, which provide a convenient environment for building component-based distributed business applications, are now widely available. Most middleware vendors have application server products on the market today. Application servers provide environments for building and deploying components.

A component, is the fundamental building block of distributed software applications. Each component has one or more interfaces that provide the points of entry for calling programs. An interface, which is defined in terms of operations (also called methods), encapsulates a component and ensures that a component is modular. That is, a developer may replace one implementation of a component for another, and as long as the new component preserves the interface and expected behavior of the old one, there will be no impact on programs that use the component. Figure 1.1 illustrates the component architecture.

Component architectures include a rich runtime environment called a container. Containers provide an array of application services that allow the application developer to concentrate on building the application rather than the supporting infrastructure.

In the Java world, the Enterprise JavaBeans (EJB) specification, which is part of the Java 2 Enterprise Edition (J2EE) from Sun Microsystems, has gained broad acceptance as the standard for Java server component architectures. Products based on the EJB specification have compelling advantages: They shield application developers from many of the low-level component service details (such as transactions and security), they enable enterprise Beans to be moved to another environment with minimal effort, and they are interoperable with other EJB products.

Beyond Java, the Object Management Group (OMG) has defined the Common Object Request Broker Architecture (CORBA) Component Model. The CORBA Component Model, which has been designed to be consistent with EJB, extends the notion of EJB to allow components to be built in other languages, such as C++. Fully compliant EJB products also support the OMG Internet Inter-ORB Protocol (IIOP), allowing EJB components and CORBA components to interoperate. Because application servers are targeted at enterprise deployment, it's no surprise that security is generally addressed in these architectures. Without a good security solution protecting corporate data on an application server, most businesses would not be willing to make their data accessible to Internet Web clients.

Distributed component computing and information security are complex technologies that are naturally in conflict. A distributed environment makes data widely accessible and thus introduces potential security holes at multiple points in the enterprise. Security protection confines systems and reduces data accessibility. As a result, distributed systems require trade-offs between the degree of distributed computing and the degree of security. Technologies are resolving the conflict between distributed computing and security, particularly in EJB and CORBA. This book explores how deploying security services in support of EJB and CORBA address security integration. This book addresses an audience of enterprise technical managers, software architects, security architects, software developers, and security administrators-particularly those now moving to distributed environments and those new to the issues of information security. We explore new ways of thinking about information security in distributed environments-focusing on how to develop practical, comprehensive approaches using new and existing technologies.

Security as an Enabler for E-Business Applications

Corporations are discovering the power of online services to increase customer loyalty, support sales efforts, and manage internal information. The common thread in these diverse efforts is the need to present end users with a unified view of information stored in multiple systems, particularly as organizations move from static Web sites to the transactional capabilities of electronic commerce. To satisfy this need, legacy systems are being integrated with powerful new e-business- -based applications that provide broad connectivity across a multitude of back-end systems. These unified applications bring direct bottomline benefits. For example: On the Internet. A bank cements relationships with commercial customers by offering increased efficiency with online currency trading. This service requires real-time updates and links to back-office transactional and profitability analysis systems...

Read More Show Less

Table of Contents

Foreword
Introduction
Acknowledgments
Ch. 1 An Overview of Enterprise Security Integration 1
Ch. 2 Securing EJB Components 27
Ch. 3 Securing CORBA Components 69
Ch. 4 Enterprise Security Technologies 109
Ch. 5 Interoperability of Cross-Domain Components 127
Ch. 6 Interoperability EJB and CORBA Components 167
Ch. 7 Protecting Application Resources 209
Ch. 8 Scaleable Security Policies 243
Ch. 9 Planning a Secure Component System 285
Ch. 10 Building an Integrated Security System 303
Glossary 337
References 351
Index 353
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)