Abstract
By presenting a protection architecture for ASP.NET Web services, this paper demonstrates the feasibility of creating middleware mechanisms in the form of composable, flexible, and extensible building blocks. Like LegoTM constructor parts, such blocks enable the reduction of the effort of constructing, extending, and adjusting the application properties and middleware services in response to requirements or environment changes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Schmidt, D.C., Cleeland, C.: Applying patterns to develop extensible ORB middleware. IEEE Communications Magazine 37(4), 54–63 (1999)
Singhai, A., Sane, A., Campbell, R.H.: Quarterware for middleware. In: 18th Interna-tional Conference on Distributed Computing Systems, Amsterdam, Netherlands. IEEE Computer Society, Los Alamitos (1998)
Wang, Y.-M., Lee, W.-J.: COMERA: COM extensible remoting architecture. In: Pro-ceedings of COOTS: 4th USENIX Conference on Object-Oriented Technologies and Sys-tems, Sante Fe, NM, USA, April 27-30, USENIX Assoc. (1998)
Hamilton, G., Powell, M.L., Mitchell, J.G.: Subcontract; A flexible base for distributed programming. In: Operating Systems Review (ACM): Proceedings of the 14th ACM Sympo-sium on Operating Systems Principles, Dececember 5-8 1993, vol. 27(5), pp. 69–79 (1993)
Balasubramanian, K., et al.: Towards composable distributed real-time and embedded software. In: WORDS 2003: 8th International Workshop on Object-oriented Real-Time De-pendable Systems, Guadalajara, January 15-17. IEEE, Mexico (2003)
Othman, O., O’Ryan, C., Schmidt, D.C.: Designing an adaptive CORBA load balancing service using TAO. IEEE Distributed Systems Online 2(4) (2001)
Nahrstedt, K., et al.: QoS-aware middleware for ubiquitous and heterogeneous environ-ments. IEEE Communications Magazine 39(11), 140–148 (2001)
Venkatasubramanian, N.: Safe ’composability’ of middleware services. Communications of the ACM 45(6), 49–52 (2002)
Krishnamurthy, S., Sanders, W.H., Cukier, M.: An Adaptive Quality of Service Aware Middleware for Replicated Services. IEEE Transactions on Parallel and Distributed Sys-tems 14(11), 1112–1125 (2003)
Crowcroft, J., et al.: Channel islands in a reflective ocean: large-scale event distribution in heterogeneous networks. IEEE Communications Magazine 40(9), 112–115
Yang, J., Kaiser, G.E.: JPernLite: extensible transaction services for the WWW. IEEE Transactions on Knowledge and Data Engineering, 1999 11(4), 639–657 (1999)
Houston, I., et al.: The CORBA Activity Service Framework for supporting extended trans-actions. Software - Practice and Experience, 2003 33(4), 351–373 (2003)
Gittler, F., Hopkins, A.C.: The DCE Security Service. Hewlett-Packard Journal 46(6), 41–48 (1995)
OMG, CORBAservices: Common Object Services Specification, Security Service Specifi-cation v1.8, Object Management Group, document formal/2002-03-11 (2002)
Sun, Java Authentication and Authorization Service (JAAS). Sun Microsystems (2001)
Sun, Java Authorization Contract for Containers (2002)
Chapin, S.J., et al.: New model of security for metasystems. Future Generation Computer Systems 15(5), 713–722 (1999)
Andersen, A., et al.: Security and middleware. In: WORDS 2003: 8th International Work-shop on Object-oriented Real-Time Dependable Systems, Guadala-jara, January 15-17, 2003. IEEE, Mexico (2003)
Beznosov, K., et al.: A Resource Access Decision Service for CORBA-based Distributed Systems. In: Annual Computer Security Applications Conference. IEEE Computer Society, Phoenix (1999)
OMG, Resource Access Decision Facility, Object Management Group (2001)
Jajodia, S., et al.: Flexible support for multiple access control policies. ACM Transactions on Database Systems 26(2), 214–260 (2001)
Siewe, F., Cau, A., Zedan, H.: A compositional framework for access control policies enforcement. In: Proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering, FMSE 2003, October 30, 2003. Association for Computing Machinery, Washington (2003)
Microsoft, Building Secure ASP.NET Applications: Authentication, Authorization, and Se-cure Communication. Microsoft Press, Redmond (2002)
Hartman, B., et al.: Mastering Web Services Security, 1st edn. John Wiley & Sons, Inc., New York (2003)
Beznosov, K.: Protecting ASP.NETWeb Services: Experience Report. in preparation (2004)
Microsoft, Altering the SOAP Message Using SOAP Extensions (2002)
Fleury, M., Reverbel, F.: The JBoss extensible server. In: Endler, M., Schmidt, D.C. (eds.) Middleware 2003. LNCS, vol. 2672. Springer, Heidelberg (2003)
Wang, N., et al.: Evaluating meta-programming mechanisms for ORB middleware. IEEE Communications Magazine, 102–113 (2001)
Baldoni, R., Marchetti, C., Verde, L.: CORBA request portable interceptors: analysis and applications. Concurrency and Computation Practice & Experience 15(6), 551–579 (2003)
Narasimhan, N., Moser, L.E., Melliar-Smith, P.M.: Interceptors for Java Remote Method Invocation. Concurrency Computation Practice and Experience 13(8-9), 755–774 (2001)
Barkley, J., Beznosov, K., Uppal, J.: Supporting Relationships in Access Control Using Role Based Access Control. In: Fourth ACM Role-based Access Control Workshop, Fairfax, Virginia, USA (1999)
Sandhu, R., et al.: Role-Based Access Control Models. IEEE Computer 29(2), 38–47 (1996)
Beznosov, K.: Object Security Attributes: Enabling Application-specific Access Control in Middleware. In: 4th International Symposium on Distributed Objects & Applications (DOA).Springer, Irvine (2002)
OMG, Security Domain Membership Management Service, Final Submission, Ob-ject Management Group (2001)
Gao, S., et al.: Applying Aspect-Orientation in Designing Security Systems: A Case Study. In: The Sixteenth International Conference on Software Engineering and Knowledge Engi-neering, Banff, Alberta, Canada (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Beznosov, K. (2005). Here’s Your LegoTM Security Kit: How to Give Developers All Protection Mechanisms They Will Ever Need. In: Gschwind, T., Mascolo, C. (eds) Software Engineering and Middleware. SEM 2004. Lecture Notes in Computer Science, vol 3437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11407386_2
Download citation
DOI: https://doi.org/10.1007/11407386_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25328-0
Online ISBN: 978-3-540-31975-7
eBook Packages: Computer ScienceComputer Science (R0)