EASI Solutions


EASI solutions integrate security technologies across the perimeter, middle, and legacy security tiers. An EASI solution first and foremost consists of a security framework, which describes a collection of security service interfaces that may be implemented by an evolving set of security products.

An EASI solution also includes integration techniques, such as bridges, wrappers, and interceptors that developers can use to plug security technologies into a middleware environment. To hook together different security technologies, EASI must solve a key problem: defining a secure association between clients and targets that establishes a common security context. The security context consists of a user’s privileges that must be transferred across the system to a target application. A user’s privileges, which form the basis for authorization decisions and audit events, must be protected as they are transmitted between perimeter, middle, and legacy tiers. Because each technology in these tiers represents and protects a user’s privileges differently, integration of security context can be a rather difficult problem.




Electronic Commerce (Networking Serie 2003)
Electronic Commerce (Charles River Media Networking/Security)
ISBN: 1584500646
EAN: 2147483647
Year: 2004
Pages: 260
Authors: Pete Loshin

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net