Data and Applications Security Developments and Directions

Slides:



Advertisements
Similar presentations
Secure Dependable Stream Data Management Vana Kalogeraki (UC Riverside) Dimitrios Gunopulos (UC Riverside) Ravi Sandhu (UT San Antonio) Bhavani Thuraisingham.
Advertisements

Distributed DBMS©M. T. Özsu & P. Valduriez Ch.15/1 Outline Introduction Background Distributed Database Design Database Integration Semantic Data Control.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 12 Slide 1 Distributed Systems Design 2.
I.1 Distributed Systems Prof. Dr. Alexander Schill Dresden Technical University Computer Networks Dept.
Chapter Object-Oriented Practices. Agenda Object-Oriented Concepts Terminology Object-Oriented Modeling Tips Object-Oriented Data Models and DBMSs.
A brief look at CORBA. What is CORBA Common Object Request Broker Architecture developed by OMG Combine benefits of OO and distributed computing Distributed.
CORBA Case Study By Jeffrey Oliver March March 17, 2003CORBA Case Study by J. T. Oliver2 History The CORBA (Common Object Request Broker Architecture)
Chapter 13 Physical Architecture Layer Design
Software – Part 3 V.T. Raja, Ph.D., Information Management College of Business Oregon State University.
Slide 1 Systems Analysis and Design With UML 2.0 An Object-Oriented Approach, Second Edition Chapter 13: Physical Architecture Layer Design Alan Dennis,
Enterprise Java Bean Matt. 2 J2EE 3 J2EE Overview.
Slide 1 Physical Architecture Layer Design Chapter 13.
Data Management Information Management Knowledge Management Data and Applications Security Challenges Bhavani Thuraisingham October 2006.
1 Introduction to Middleware. 2 Outline What is middleware? Purpose and origin Why use it? What Middleware does? Technical details Middleware services.
Databases JDBC (Java Database Connectivity) –Thin clients – servlet,JavaServer Pages (JSP) –Thick clients – RMI to remote databases –most recommended way.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Secure Object Data Management.
CSC 480 Software Engineering Lecture 18 Nov 6, 2002.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
CS 240, Prof. Sarwar Slide 1 CS 240: Software Project Fall 2003 Sections 1 & 2 Dr. Badrul M. Sarwar San Jose State University Lecture #23.
CS 501: Software Engineering Fall 1999 Lecture 12 System Architecture III Distributed Objects.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data.
S imple O bject A ccess P rotocol Karthikeyan Chandrasekaran & Nandakumar Padmanabhan.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Security for Distributed Data Management.
Introduction to Distributed Systems and CORBA Slides for CSCI 3171 Lectures E. W. Grundke.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #25 Dependable Data Management.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Secure Object Systems.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #11 Secure Heterogeneous.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Dependable Data Management April.
1 Distributed Systems Architectures Distributed object architectures Reference: ©Ian Sommerville 2000 Software Engineering, 6th edition.
Internet and Distributed Application Services
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Common Object Request Broker Architecture (CORBA)
Distributed Computing
Chapter 2 Database System Concepts and Architecture
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Systems Analysis and Design With UML 2
CORBA Within the OS & Its Implementation
The OMG Approach (continued)
Inventory of Distributed Computing Concepts and Web services
Enterprise Service Bus (ESB) (Chapter 9)
Frameworks And Patterns
Inventory of Distributed Computing Concepts
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Enterprise Computing: An Overview
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Quality Assurance for Component-Based Software Development
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Introduction to Service-Orientation
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Inventory of Distributed Computing Concepts
Presentation transcript:

Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Secure Object Systems March 2, 2009

Outline Background on object systems Discretionary security Multilevel security Objects for modeling secure applications Object Request Brokers Secure Object Request Brokers Secure frameworks Directions

Concepts in Object Database Systems Objects- every entity is an object Example: Book, Film, Employee, Car Class Objects with common attributes are grouped into a class Attributes or Instance Variables Properties of an object class inherited by the object instances Class Hierarchy Parent-Child class hierarchy Composite objects Book object with paragraphs, sections etc. Methods Functions associated with a class

Example Class Hierarchy ID Name Author Publisher Document Class D1 D2 Method1: Method2: Print-doc-att(ID) Print-doc(ID) Journal Subclass Book Subclass # of Chapters Volume # B1 J1

Example Composite Object Document Object Section 2 Object Section 1 Object Paragraph 1 Object Paragraph 2 Object

Security Issues Access Control on Objects, Classes, Attributes etc. Execute permissions on Methods Multilevel Security Security impact on class hierarchies Security impact on composite hierarchies

Objects and Security Secure OODB Secure OODA Secure DOM Persistent Design and analysis Infrastructure data store Secure OOPL Programming Secure Frameworks language Business objects Secure OOT Technologies Secure OOM Unified Object Model is Evolving

Access Control

Access Control Hierarchies

Secure Object Relational Model

Policy Enforcement

Sample Systems

Multilevel Security

Some Security Properties Security level of an instance must dominate the level of the class Security level of a subclass must dominate the level of the superclass Classifying associations between two objects Method must execute at a level that dominates the level of the method

Multilevel Secure Object Relational Systems

Sample MLS Object Systems

Objects for Secure Applications

Object Modeling

Dynamic Model

Functional Model

UML and Policies

Distributed Object Management Systems Integrates heterogeneous applications, systems and databases Every node, database or application is an object Connected through a Bus Examples of Bus include Object Request Brokers (Object Management Group) Distributed Component Object Model (Microsoft)

Object-based Interoperability Server Client Object Object Object Request Broker Example Object Request Broker: Object Management Group’s (OMG) CORBA (Common Object Request Broker Architecture)

Javasoft’s RMI (Remote Method Invocation) RMI Business Objects Clients Java-based Servers

Objects and Security Secure OODB Secure OODA Secure DOM Persistent Design and analysis Infrastructure data store Secure OOPL Programming Secure Frameworks language Business objects Secure OOT Technologies Secure OOM Unified Object Model is Evolving

Secure Object Request Brokers

CORBA (Common Object Request Broker Architecture) Security Security Service provides the following: Confidentiality Integrity Accountability Availability URLs http://www.javaolympus.com/J2SE/NETWORKING/CORBA/COR BASecurity.jsp http://student.cosy.sbg.ac.at/~amayer/projects/corbasec/sec_ov erview.html www.omg.org

OMG Security Specifications

CORBA (Common Object Request Broker Architecture) Security Security Service provides the following: Confidentiality Integrity Accountability Availability URLs http://www.javaolympus.com/J2SE/NETWORKING/CORBA/COR BASecurity.jsp http://student.cosy.sbg.ac.at/~amayer/projects/corbasec/sec_ov erview.html www.omg.org

CORBA (Common Object Request Broker Architecture) Security - 2 Identification and Authentication of Principles Authorization and Access Control Security Auditing Security of communications Administration of security information Non repudiation

Dependable Object Request Brokers Navigation Data Analysis Programming Display Consoles Data Links Processor Group (DAPG) (14) & Sensors Refresh Channels Sensor Multi-Sensor Detections Tracks Technology provided by Project Integrate Security, Real- time and Fault Tolerance Computing Future Future Future App App App Data MSI Mgmt. Data App Xchg. Infrastructure Services Real Time Operating System Hardware

Secure Frameworks

Directions Object Models UML for Security applications is becoming common practice Secure distributed object systems has gained popularity Evolution into secure object-based middleware Secure object-based languages Integrating security and real-time for object systems Distributed Objects Security cannot be an afterthought for object-based interoperability Use ORBs that have implemented security services Trends are moving towards Java based interoperability and Enterprise Application Integration (EAI) Examples of EAI products are Web Sphere (IBM) and Web Logic (BEA) Security has to be incorporated into EAI products