Anthony Nadalin - Academia.edu (original) (raw)

Uploads

Papers by Anthony Nadalin

Research paper thumbnail of An Approach to Moving Industry Business Messaging Standards to Web Services

Research paper thumbnail of Identity Metasystem Interoperability Version 1.0

This document is intended for developers and architects who wish to design identity systems and a... more This document is intended for developers and architects who wish to design identity systems and applications that interoperate using the Identity Metasystem Interoperability specification. An Identity Selector and the associated identity system components allow users to manage their Digital Identities from different Identity Providers, and employ them in various contexts to access online services. In this specification, identities are represented

Research paper thumbnail of An autonomic approach for managing security and identity management policies in enterprises

Journal of High Speed Networks, 2006

Research paper thumbnail of User authentication and authorization in the Java/sup TM/ platform

Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99), 1999

Java security technology originally focused on creat- ing a safe environment in which to run pote... more Java security technology originally focused on creat- ing a safe environment in which to run potentially untrusted code downloaded from the public network. With the latest release of the Java Platform (the Java 2 Software De- velopment Kit, v 1.2), fine-grained access controls can be placed upon critical resources with regard to the identity of the running applets and applications,

Research paper thumbnail of Securing service-oriented applications

ISSE 2006 — Securing Electronic Busines Processes, 2006

Securing applications in a service-oriented architecture is challenging, because the loose coupli... more Securing applications in a service-oriented architecture is challenging, because the loose coupling that characterizes a SOA can also expose existing security implementations’ brittleness. Our solution includes well-defined trust models based on acceptable forms of proof, as well as reliance on policies, Web Services security, and security engineering best practices.

Research paper thumbnail of Security challenges for Enterprise Java in an e-business environment

IBM Systems Journal, 2000

As e-business matures, companies require enterprise-scalable functionality for their corporate In... more As e-business matures, companies require enterprise-scalable functionality for their corporate Internet and intranet environments. To support the expansion of their computing boundaries, businesses have embraced Web application servers. These servers support servlets, JavaServer Pages,, and Enterprise JavaBeans, technologies, providing simplified development and ˉexible deployment of Web-based applications. However, securing this malleable model presents a challenge. Successful companies recognize that their

Research paper thumbnail of The evolution of Java security

IBM Systems Journal, 2000

This paper provides a high-level overview of the development and evolution of Jeve" security... more This paper provides a high-level overview of the development and evolution of Jeve" security. Java is a maturing technology that has evolved from its commercial origins as a browser-based scripting tool. We review the various deployment environments in which ...

Research paper thumbnail of Approach to object security in Distributed SOM

Computers & Security, 1996

... Because they are classes, both SOMObject and SOMClass are instances of the root metaclass, SO... more ... Because they are classes, both SOMObject and SOMClass are instances of the root metaclass, SOMClass. The SOMObject class introduces generic methods that, by inheritance, are applicable to all SOM objects of an application. These methods provide basic SOM ...

Research paper thumbnail of Use of DSOM Before / After Metaclass for Enabling Object Access Control

Distributed Platforms, 1996

We review the IBM’s System Object Model (SOM) and Distributed SOM (DSOM). Then, we introduce DSOM... more We review the IBM’s System Object Model (SOM) and Distributed SOM (DSOM). Then, we introduce DSOM’s approach to object access control and contrast it with traditional procedural systems. Subsequently, we elaborate on the problem addressed in this paper that seeks to enable the process of object access control within DSOM kernel transpaxently from application developers. We discuss different approaches to

Research paper thumbnail of Web Services Security

Research paper thumbnail of Web services policy framework (ws-policy framework)

Research paper thumbnail of Web Services Coordination (WS Coordination)

Research paper thumbnail of Passive Requestor Federation Interop Scenario

Research paper thumbnail of Web services security: soap message security

Research paper thumbnail of OASIS Committee Specification, 14 November

20 Abstract: 21 This document describes how to use the UsernameToken with the Web Services 22 Sec... more 20 Abstract: 21 This document describes how to use the UsernameToken with the Web Services 22 Security (WSS) specification. 23 Status: 24 This is a technical committee document submitted for consideration by the OASIS Web 25 Services Security (WSS) technical committee. Please send comments to the editors. 26

Research paper thumbnail of Securing Web services

IBM Systems Journal, 2000

... end user. Figure 1 Usage scenario POST /TravelService HTTP/1.1 . . . <SOAP-ENV:Body> &l... more ... end user. Figure 1 Usage scenario POST /TravelService HTTP/1.1 . . . <SOAP-ENV:Body> <m:makeReservation xmlns:m="some-URI"> <flight>ABC1234</flight> ... <m:makeReservation> </SOAP-ENV:Body> . . . . SOAP ...

Research paper thumbnail of Business-driven application security: From modeling to managing secure applications

IBM Systems Journal, 2000

... Architecture** (MDA**) 2,3 approach to separate the platform-independent model of the applica... more ... Architecture** (MDA**) 2,3 approach to separate the platform-independent model of the applicationarchitecture from the ... Managing a secure on demand business is an ongoing learning experience. ... the tasks within the life-cycle phases in order to accomplish the business goals. ...

Research paper thumbnail of Web services security policy language (WS-SecurityPolicy)

December, 2002

This document is an addendum to WS-Security and indicates the policy assertions for WS-Policy whi... more This document is an addendum to WS-Security and indicates the policy assertions for WS-Policy which apply to WS-Security.

Research paper thumbnail of Enterprise Java security: building secure J2EE applications

Many of the designations used by manufacturers and sellers to distinguish their products are clai... more Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trade-marks. Where those designations appear in this book, and Addison-Wesley was aware of a trademark claim, the designations have been printed with initial capital ...

Research paper thumbnail of Web services secure conversation language (WS-SecureConversation)

This specification defines extensions that build on [WS-Security] and [WS-Trust] to provide secur... more This specification defines extensions that build on [WS-Security] and [WS-Trust] to provide secure communication across one or more messages. Specifically, this specification defines mechanisms for establishing and sharing security contexts, and deriving keys from established security contexts (or any shared secret).

Research paper thumbnail of An Approach to Moving Industry Business Messaging Standards to Web Services

Research paper thumbnail of Identity Metasystem Interoperability Version 1.0

This document is intended for developers and architects who wish to design identity systems and a... more This document is intended for developers and architects who wish to design identity systems and applications that interoperate using the Identity Metasystem Interoperability specification. An Identity Selector and the associated identity system components allow users to manage their Digital Identities from different Identity Providers, and employ them in various contexts to access online services. In this specification, identities are represented

Research paper thumbnail of An autonomic approach for managing security and identity management policies in enterprises

Journal of High Speed Networks, 2006

Research paper thumbnail of User authentication and authorization in the Java/sup TM/ platform

Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99), 1999

Java security technology originally focused on creat- ing a safe environment in which to run pote... more Java security technology originally focused on creat- ing a safe environment in which to run potentially untrusted code downloaded from the public network. With the latest release of the Java Platform (the Java 2 Software De- velopment Kit, v 1.2), fine-grained access controls can be placed upon critical resources with regard to the identity of the running applets and applications,

Research paper thumbnail of Securing service-oriented applications

ISSE 2006 — Securing Electronic Busines Processes, 2006

Securing applications in a service-oriented architecture is challenging, because the loose coupli... more Securing applications in a service-oriented architecture is challenging, because the loose coupling that characterizes a SOA can also expose existing security implementations’ brittleness. Our solution includes well-defined trust models based on acceptable forms of proof, as well as reliance on policies, Web Services security, and security engineering best practices.

Research paper thumbnail of Security challenges for Enterprise Java in an e-business environment

IBM Systems Journal, 2000

As e-business matures, companies require enterprise-scalable functionality for their corporate In... more As e-business matures, companies require enterprise-scalable functionality for their corporate Internet and intranet environments. To support the expansion of their computing boundaries, businesses have embraced Web application servers. These servers support servlets, JavaServer Pages,, and Enterprise JavaBeans, technologies, providing simplified development and ˉexible deployment of Web-based applications. However, securing this malleable model presents a challenge. Successful companies recognize that their

Research paper thumbnail of The evolution of Java security

IBM Systems Journal, 2000

This paper provides a high-level overview of the development and evolution of Jeve" security... more This paper provides a high-level overview of the development and evolution of Jeve" security. Java is a maturing technology that has evolved from its commercial origins as a browser-based scripting tool. We review the various deployment environments in which ...

Research paper thumbnail of Approach to object security in Distributed SOM

Computers & Security, 1996

... Because they are classes, both SOMObject and SOMClass are instances of the root metaclass, SO... more ... Because they are classes, both SOMObject and SOMClass are instances of the root metaclass, SOMClass. The SOMObject class introduces generic methods that, by inheritance, are applicable to all SOM objects of an application. These methods provide basic SOM ...

Research paper thumbnail of Use of DSOM Before / After Metaclass for Enabling Object Access Control

Distributed Platforms, 1996

We review the IBM’s System Object Model (SOM) and Distributed SOM (DSOM). Then, we introduce DSOM... more We review the IBM’s System Object Model (SOM) and Distributed SOM (DSOM). Then, we introduce DSOM’s approach to object access control and contrast it with traditional procedural systems. Subsequently, we elaborate on the problem addressed in this paper that seeks to enable the process of object access control within DSOM kernel transpaxently from application developers. We discuss different approaches to

Research paper thumbnail of Web Services Security

Research paper thumbnail of Web services policy framework (ws-policy framework)

Research paper thumbnail of Web Services Coordination (WS Coordination)

Research paper thumbnail of Passive Requestor Federation Interop Scenario

Research paper thumbnail of Web services security: soap message security

Research paper thumbnail of OASIS Committee Specification, 14 November

20 Abstract: 21 This document describes how to use the UsernameToken with the Web Services 22 Sec... more 20 Abstract: 21 This document describes how to use the UsernameToken with the Web Services 22 Security (WSS) specification. 23 Status: 24 This is a technical committee document submitted for consideration by the OASIS Web 25 Services Security (WSS) technical committee. Please send comments to the editors. 26

Research paper thumbnail of Securing Web services

IBM Systems Journal, 2000

... end user. Figure 1 Usage scenario POST /TravelService HTTP/1.1 . . . <SOAP-ENV:Body> &l... more ... end user. Figure 1 Usage scenario POST /TravelService HTTP/1.1 . . . <SOAP-ENV:Body> <m:makeReservation xmlns:m="some-URI"> <flight>ABC1234</flight> ... <m:makeReservation> </SOAP-ENV:Body> . . . . SOAP ...

Research paper thumbnail of Business-driven application security: From modeling to managing secure applications

IBM Systems Journal, 2000

... Architecture** (MDA**) 2,3 approach to separate the platform-independent model of the applica... more ... Architecture** (MDA**) 2,3 approach to separate the platform-independent model of the applicationarchitecture from the ... Managing a secure on demand business is an ongoing learning experience. ... the tasks within the life-cycle phases in order to accomplish the business goals. ...

Research paper thumbnail of Web services security policy language (WS-SecurityPolicy)

December, 2002

This document is an addendum to WS-Security and indicates the policy assertions for WS-Policy whi... more This document is an addendum to WS-Security and indicates the policy assertions for WS-Policy which apply to WS-Security.

Research paper thumbnail of Enterprise Java security: building secure J2EE applications

Many of the designations used by manufacturers and sellers to distinguish their products are clai... more Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trade-marks. Where those designations appear in this book, and Addison-Wesley was aware of a trademark claim, the designations have been printed with initial capital ...

Research paper thumbnail of Web services secure conversation language (WS-SecureConversation)

This specification defines extensions that build on [WS-Security] and [WS-Trust] to provide secur... more This specification defines extensions that build on [WS-Security] and [WS-Trust] to provide secure communication across one or more messages. Specifically, this specification defines mechanisms for establishing and sharing security contexts, and deriving keys from established security contexts (or any shared secret).