Font Size: a A A

Research And Application Of CORBA Security Technology

Posted on:2007-02-22Degree:MasterType:Thesis
Country:ChinaCandidate:C P WeiFull Text:PDF
GTID:2178360212475789Subject:Military Equipment
Abstract/Summary:PDF Full Text Request
CORBA is a middleware-based distributed object technology. It is a platform and language independences technology. The CORBA component technology is based on the CORBA proxy technology. It inherits the advantages of CORBA such as good stabihty, efficiency, good expansibility and so on. Simultaneously it reduces the complexity of programming and shortens the cycle of programming. So it will do well in the military information systems.The security problems in the military application need to be well resolved. This article analyzes the CORBA security service and its limitation, introduces RBAC into CORBAsec to remedy the complexity in management and the weak expansibility of access control model of CORBAsec, improves the traditional RBAC model and proposes a domain layered RBACModel------DLRBAC, and proposes a management model of DLRBAC. These make the accesscontrol model of CORBAsec more suitable to the application in large-scale, component-based and distribution hierarchical system which has more than one same subpart in a layer. The paper also implements the DLRBAC Model in the information submitting system.Non-repudiation service is another kind of important safe service of CORBAsec, but it lacks the programming details because of the incomplete specification. Therefore the more integrity and enhancement on the specification are needed. This paper produces a non-repudiation model which improves the traditional one, because it provides the proof indicating whether the request is executed successfully or not. Then the paper designs and implements the creation, transmission and the verification of evidence, and makes use of XML signature which is easy to transmit and expand to construct evidence.Base on the research, this paper designs and implements the main functions and the security module of the information submitting system. The implementation of the system uses component-based developments technologies. It uses the UML modeling technology to analyse the system and defines the interfaces, then extracts the components of the system. Completes programming, assembly and deployment works on the OpenCCM platform. The security interceptor which helps inserting the security policy to the ORB which is used, this enhances the security capabilities and guarantees the security function can't be bypassed.
Keywords/Search Tags:CORBA/CCM, Access control, Non-repudiation, Security, Component
PDF Full Text Request
Related items