메뉴 건너뛰기




Volumn 2002-January, Issue , 2002, Pages 53-60

Role-based access control for CORBA distributed object systems

Author keywords

Access control; Automation; Data security; Information security; Large scale systems; Management information systems; Middleware; NIST; Object oriented modeling; Permission

Indexed keywords

AUTOMATION; COMMON OBJECT REQUEST BROKER ARCHITECTURE (CORBA); INFORMATION MANAGEMENT; LARGE SCALE SYSTEMS; MANAGEMENT INFORMATION SYSTEMS; MIDDLEWARE; REAL TIME SYSTEMS; SECURITY OF DATA;

EID: 77950593797     PISSN: 15301443     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WORDS.2002.1000036     Document Type: Conference Paper
Times cited : (8)

References (15)
  • 3
    • 0242612502 scopus 로고    scopus 로고
    • JacORB - Design and Implementation of a Java ORB
    • Sept.
    • G. Brose. JacORB - Design and Implementation of a Java ORB. In Proc. DAIS'97, pages 143-154, Sept. 1997.
    • (1997) Proc. DAIS'97 , pp. 143-154
    • Brose, G.1
  • 5
    • 0002422823 scopus 로고    scopus 로고
    • A Role-Based Access Control Model and Reference Implementation Within a Corporate Intranet
    • Feb.
    • D. F. Ferraiolo, J. F. Barkley, and D. R. Kuhn. A Role-Based Access Control Model and Reference Implementation Within a Corporate Intranet. ACM Transactions on Information and Systems Security, 2(1):34-64, Feb. 1999.
    • (1999) ACM Transactions on Information and Systems Security , vol.2 , Issue.1 , pp. 34-64
    • Ferraiolo, D.F.1    Barkley, J.F.2    Kuhn, D.R.3
  • 10
    • 84949209032 scopus 로고    scopus 로고
    • version 1.7. OMG Document 99-12-02, Dec.
    • Object Management Group. Security Service Specification, version 1.7. OMG Document 99-12-02, Dec. 1999.
    • (1999) Security Service Specification
  • 14
    • 10044232517 scopus 로고    scopus 로고
    • Authorization Schemes for Large-Scale Systems Based on Java, CORBA and Web Security Models
    • Brisbane, Australia, Sept.
    • C. M. Westphall and J. S. Fraga. Authorization Schemes for Large-Scale Systems Based on Java, CORBA and Web Security Models. In Proceedings of the IEEE International Conference on Networks (ICON'99), pages 327-334, Brisbane, Australia, Sept. 1999.
    • (1999) Proceedings of the IEEE International Conference on Networks (ICON'99) , pp. 327-334
    • Westphall, C.M.1    Fraga, J.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.