DocumentCode :
2616310
Title :
Security Analysis of the Utilization of Corba Object References as Authorization Tokens
Author :
Becker, Christoph ; Staamann, Sebastian ; Salomon, Ralf
Author_Institution :
PrismTech, Burlington, MA
fYear :
2007
fDate :
7-9 May 2007
Firstpage :
196
Lastpage :
203
Abstract :
In object-oriented real-time computing scenarios, particularly where Corba is used in embedded systems with resource constraints, developers and system architects often utilize Corba object references as authorization tokens. This paper investigates the security of this method in principle, and it presents the results of the analysis of the work and computing effort necessary for a potential attacker to fabricate Corba object references to existing objects for the purpose of illegitimately gaining access to these objects at the instance of seven widely used Corba products
Keywords :
authorisation; distributed object management; embedded systems; object-oriented programming; Corba object references; authorization tokens; embedded systems; object-oriented real-time computing; resource constraints; security analysis; Authorization; Communication system security; Computational intelligence; Computers; Embedded computing; Embedded system; Logic design; Probes; Real time systems; Software systems;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Object and Component-Oriented Real-Time Distributed Computing, 2007. ISORC '07. 10th IEEE International Symposium on
Conference_Location :
Santorini Island
Print_ISBN :
0-7695-2765-5
Type :
conf
DOI :
10.1109/ISORC.2007.54
Filename :
4208844
Link To Document :
بازگشت