Anthony Nadalin - Academia.edu (original) (raw)
Uploads
Papers by Anthony Nadalin
This document is intended for developers and architects who wish to design identity systems and a... more This document is intended for developers and architects who wish to design identity systems and applications that interoperate using the Identity Metasystem Interoperability specification. An Identity Selector and the associated identity system components allow users to manage their Digital Identities from different Identity Providers, and employ them in various contexts to access online services. In this specification, identities are represented
Journal of High Speed Networks, 2006
Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99), 1999
Java security technology originally focused on creat- ing a safe environment in which to run pote... more Java security technology originally focused on creat- ing a safe environment in which to run potentially untrusted code downloaded from the public network. With the latest release of the Java Platform (the Java 2 Software De- velopment Kit, v 1.2), fine-grained access controls can be placed upon critical resources with regard to the identity of the running applets and applications,
ISSE 2006 — Securing Electronic Busines Processes, 2006
Securing applications in a service-oriented architecture is challenging, because the loose coupli... more Securing applications in a service-oriented architecture is challenging, because the loose coupling that characterizes a SOA can also expose existing security implementations’ brittleness. Our solution includes well-defined trust models based on acceptable forms of proof, as well as reliance on policies, Web Services security, and security engineering best practices.
IBM Systems Journal, 2000
As e-business matures, companies require enterprise-scalable functionality for their corporate In... more As e-business matures, companies require enterprise-scalable functionality for their corporate Internet and intranet environments. To support the expansion of their computing boundaries, businesses have embraced Web application servers. These servers support servlets, JavaServer Pages,, and Enterprise JavaBeans, technologies, providing simplified development and ˉexible deployment of Web-based applications. However, securing this malleable model presents a challenge. Successful companies recognize that their
IBM Systems Journal, 2000
This paper provides a high-level overview of the development and evolution of Jeve" security... more This paper provides a high-level overview of the development and evolution of Jeve" security. Java is a maturing technology that has evolved from its commercial origins as a browser-based scripting tool. We review the various deployment environments in which ...
Computers & Security, 1996
... Because they are classes, both SOMObject and SOMClass are instances of the root metaclass, SO... more ... Because they are classes, both SOMObject and SOMClass are instances of the root metaclass, SOMClass. The SOMObject class introduces generic methods that, by inheritance, are applicable to all SOM objects of an application. These methods provide basic SOM ...
Distributed Platforms, 1996
We review the IBM’s System Object Model (SOM) and Distributed SOM (DSOM). Then, we introduce DSOM... more We review the IBM’s System Object Model (SOM) and Distributed SOM (DSOM). Then, we introduce DSOM’s approach to object access control and contrast it with traditional procedural systems. Subsequently, we elaborate on the problem addressed in this paper that seeks to enable the process of object access control within DSOM kernel transpaxently from application developers. We discuss different approaches to
20 Abstract: 21 This document describes how to use the UsernameToken with the Web Services 22 Sec... more 20 Abstract: 21 This document describes how to use the UsernameToken with the Web Services 22 Security (WSS) specification. 23 Status: 24 This is a technical committee document submitted for consideration by the OASIS Web 25 Services Security (WSS) technical committee. Please send comments to the editors. 26
IBM Systems Journal, 2000
... end user. Figure 1 Usage scenario POST /TravelService HTTP/1.1 . . . <SOAP-ENV:Body> &l... more ... end user. Figure 1 Usage scenario POST /TravelService HTTP/1.1 . . . <SOAP-ENV:Body> <m:makeReservation xmlns:m="some-URI"> <flight>ABC1234</flight> ... <m:makeReservation> </SOAP-ENV:Body> . . . . SOAP ...
IBM Systems Journal, 2000
... Architecture** (MDA**) 2,3 approach to separate the platform-independent model of the applica... more ... Architecture** (MDA**) 2,3 approach to separate the platform-independent model of the applicationarchitecture from the ... Managing a secure on demand business is an ongoing learning experience. ... the tasks within the life-cycle phases in order to accomplish the business goals. ...
December, 2002
This document is an addendum to WS-Security and indicates the policy assertions for WS-Policy whi... more This document is an addendum to WS-Security and indicates the policy assertions for WS-Policy which apply to WS-Security.
Many of the designations used by manufacturers and sellers to distinguish their products are clai... more Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trade-marks. Where those designations appear in this book, and Addison-Wesley was aware of a trademark claim, the designations have been printed with initial capital ...
This specification defines extensions that build on [WS-Security] and [WS-Trust] to provide secur... more This specification defines extensions that build on [WS-Security] and [WS-Trust] to provide secure communication across one or more messages. Specifically, this specification defines mechanisms for establishing and sharing security contexts, and deriving keys from established security contexts (or any shared secret).
This document is intended for developers and architects who wish to design identity systems and a... more This document is intended for developers and architects who wish to design identity systems and applications that interoperate using the Identity Metasystem Interoperability specification. An Identity Selector and the associated identity system components allow users to manage their Digital Identities from different Identity Providers, and employ them in various contexts to access online services. In this specification, identities are represented
Journal of High Speed Networks, 2006
Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99), 1999
Java security technology originally focused on creat- ing a safe environment in which to run pote... more Java security technology originally focused on creat- ing a safe environment in which to run potentially untrusted code downloaded from the public network. With the latest release of the Java Platform (the Java 2 Software De- velopment Kit, v 1.2), fine-grained access controls can be placed upon critical resources with regard to the identity of the running applets and applications,
ISSE 2006 — Securing Electronic Busines Processes, 2006
Securing applications in a service-oriented architecture is challenging, because the loose coupli... more Securing applications in a service-oriented architecture is challenging, because the loose coupling that characterizes a SOA can also expose existing security implementations’ brittleness. Our solution includes well-defined trust models based on acceptable forms of proof, as well as reliance on policies, Web Services security, and security engineering best practices.
IBM Systems Journal, 2000
As e-business matures, companies require enterprise-scalable functionality for their corporate In... more As e-business matures, companies require enterprise-scalable functionality for their corporate Internet and intranet environments. To support the expansion of their computing boundaries, businesses have embraced Web application servers. These servers support servlets, JavaServer Pages,, and Enterprise JavaBeans, technologies, providing simplified development and ˉexible deployment of Web-based applications. However, securing this malleable model presents a challenge. Successful companies recognize that their
IBM Systems Journal, 2000
This paper provides a high-level overview of the development and evolution of Jeve" security... more This paper provides a high-level overview of the development and evolution of Jeve" security. Java is a maturing technology that has evolved from its commercial origins as a browser-based scripting tool. We review the various deployment environments in which ...
Computers & Security, 1996
... Because they are classes, both SOMObject and SOMClass are instances of the root metaclass, SO... more ... Because they are classes, both SOMObject and SOMClass are instances of the root metaclass, SOMClass. The SOMObject class introduces generic methods that, by inheritance, are applicable to all SOM objects of an application. These methods provide basic SOM ...
Distributed Platforms, 1996
We review the IBM’s System Object Model (SOM) and Distributed SOM (DSOM). Then, we introduce DSOM... more We review the IBM’s System Object Model (SOM) and Distributed SOM (DSOM). Then, we introduce DSOM’s approach to object access control and contrast it with traditional procedural systems. Subsequently, we elaborate on the problem addressed in this paper that seeks to enable the process of object access control within DSOM kernel transpaxently from application developers. We discuss different approaches to
20 Abstract: 21 This document describes how to use the UsernameToken with the Web Services 22 Sec... more 20 Abstract: 21 This document describes how to use the UsernameToken with the Web Services 22 Security (WSS) specification. 23 Status: 24 This is a technical committee document submitted for consideration by the OASIS Web 25 Services Security (WSS) technical committee. Please send comments to the editors. 26
IBM Systems Journal, 2000
... end user. Figure 1 Usage scenario POST /TravelService HTTP/1.1 . . . <SOAP-ENV:Body> &l... more ... end user. Figure 1 Usage scenario POST /TravelService HTTP/1.1 . . . <SOAP-ENV:Body> <m:makeReservation xmlns:m="some-URI"> <flight>ABC1234</flight> ... <m:makeReservation> </SOAP-ENV:Body> . . . . SOAP ...
IBM Systems Journal, 2000
... Architecture** (MDA**) 2,3 approach to separate the platform-independent model of the applica... more ... Architecture** (MDA**) 2,3 approach to separate the platform-independent model of the applicationarchitecture from the ... Managing a secure on demand business is an ongoing learning experience. ... the tasks within the life-cycle phases in order to accomplish the business goals. ...
December, 2002
This document is an addendum to WS-Security and indicates the policy assertions for WS-Policy whi... more This document is an addendum to WS-Security and indicates the policy assertions for WS-Policy which apply to WS-Security.
Many of the designations used by manufacturers and sellers to distinguish their products are clai... more Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trade-marks. Where those designations appear in this book, and Addison-Wesley was aware of a trademark claim, the designations have been printed with initial capital ...
This specification defines extensions that build on [WS-Security] and [WS-Trust] to provide secur... more This specification defines extensions that build on [WS-Security] and [WS-Trust] to provide secure communication across one or more messages. Specifically, this specification defines mechanisms for establishing and sharing security contexts, and deriving keys from established security contexts (or any shared secret).