DocumentCode :
624247
Title :
Securely handling application-to-application connection credentials
Author :
Lieberman, Gary ; Mitropoulos, Frank J.
Author_Institution :
Grad. Sch. of Comput. Sci., Nova Southeastern Univ., Fort Lauderdale, FL, USA
fYear :
2013
fDate :
4-7 April 2013
Firstpage :
1
Lastpage :
7
Abstract :
The utilization of application-to-application credentials within interpretive language scripts and application code has long been a security risk. The quandaries being how to protect and secure the credentials embedded in source code and avoid exploitation from rogue programmers, sys admins and other users with authorized high levels of privilege. To date the pervasive method for addressing this has been to live with the risk and concentrate on mitigating the impact of expected and eventual exploitation. Recently published research efforts support the pervasive acceptance of this risk by such stayed auditing bodies such as the Institute of Internal Auditing (IIA) and the Information Systems Audit and Control Association (ISCAA). Numerous research efforts have taken place were built on the premise that nothing can be done to avoid the risk so it is best to concentrate the research on reducing the impact of exploitation. The research presented in this paper develops a method by which interpretive language scripts can request credentials from a commercial password vault and have those credentials returned to the script in such a manner as to reduce the risk of exploit significantly over generally accepted methods for credential handling.
Keywords :
aspect-oriented programming; risk management; security of data; ubiquitous computing; IIA; ISCAA; Information Systems Audit-and-Control Association; Institute-of-Internal Auditing; application code; application-to-application connection credentials; auditing bodies; credential handling; credential protection; credential security; interpretive language scripts; password vault; pervasive acceptance; pervasive method; security risk; source code; Batch production systems; Linux; Payloads; Probes; Security; Vectors; Weapons; aspect oriented; connection credentials; pass word vault; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Southeastcon, 2013 Proceedings of IEEE
Conference_Location :
Jacksonville, FL
ISSN :
1091-0050
Print_ISBN :
978-1-4799-0052-7
Type :
conf
DOI :
10.1109/SECON.2013.6567464
Filename :
6567464
Link To Document :
بازگشت