Software engineering for security: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Generating wrappers for command line programs: the Cal-Aggie Wrap-O-Matic project
ICSE '01 Proceedings of the 23rd International Conference on Software Engineering
A framework for flexible evolution in distributed heterogeneous systems
Proceedings of the International Workshop on Principles of Software Evolution
Encapsulation of legacy software: A technique for reusing legacy software components
Annals of Software Engineering
Reengineering legacy systems for distributed environments
Journal of Systems and Software
DADO: enhancing middleware to support crosscutting features in distributed, heterogeneous systems
Proceedings of the 25th International Conference on Software Engineering
Engineering high-performance legacy codes as CORBA components for problem-solving environments
Journal of Parallel and Distributed Computing
SGrid: a service-oriented model for the Semantic grid
Future Generation Computer Systems - Special issue: Semantic grid and knowledge grid: the next-generation web
Leveraging legacy codes to distributed problem-solving environments: a web services approach
Software—Practice & Experience
Wrapper-based evolution of legacy information systems
ACM Transactions on Software Engineering and Methodology (TOSEM)
DeXteR: an extensible framework for declarative parameter passing in distributed object systems
Proceedings of the 9th ACM/IFIP/USENIX International Conference on Middleware
A mediation framework for achieving interoperability in pervasive grid-based homecare systems
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Expressive and Extensible Parameter Passing for Distributed Object Systems
ACM Transactions on Software Engineering and Methodology (TOSEM)
Aspect-Oriented development of crosscutting features in distributed, heterogeneous systems
Transactions on Aspect-Oriented Software Development II
Hi-index | 0.00 |
Legacy systems provide services that remain useful beyond the means of the technology in which they were originally implemented. Our Legacy Wrapper tool packages the services of a legacy application in order to redistribute as a distributed object. In this new environment, the wrapper provides its own layer of security between the security domains of the host and the distributed object system. This security layer includes a sandbox for the application that is designed to protect the application against malicious users and the host from malicious applications.In this paper we will present the Legacy Access model and the Legacy Wrapper system. The Legacy Access Model is an original system access model that presents a four tiered sandboxing model for wrapping legacy applications: complete encapsulation, shared sandbox, single sandbox, sandboxless operation. The Legacy Wrapper tool is an implementation of the model that combines wrapping an application for security purposes with wrapping it for distribution in a distributed object system.