메뉴 건너뛰기




Volumn 1895, Issue , 2000, Pages 88-105

A typed access control model for CORBA

Author keywords

Access control; CORBA; Roles; Types

Indexed keywords

ACCESS CONTROL MODELS; OBJECT ORIENTED PROGRAMMING;

EID: 84944060696     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/10722599_6     Document Type: Conference Paper
Times cited : (9)

References (24)
  • 1
    • 85159644089 scopus 로고    scopus 로고
    • Adiron
    • Adiron. http://www.adiron.com/.
  • 2
    • 0025028340 scopus 로고
    • Naming and grouping privileges to simplify security management in large databases
    • Robert W. Baldwin. Naming and grouping privileges to simplify security management in large databases. In Proc. IEEE Symposium on Research in Security and Privacy, pages 116-132, 1990.
    • (1990) Proc. IEEE Symposium on Research in Security and Privacy , pp. 116-132
    • Baldwin, R.W.1
  • 5
    • 85159721510 scopus 로고    scopus 로고
    • Gerald Brose. JacORB - design and implementation of a Java ORB. In Proc. International Conference on Distributed Applications and Interoperable Systems (DAIS’97), pages 143-154, Cottbus, Germany, September 1997. Chapman & Hall.
    • Brose, G.1
  • 8
    • 84944058022 scopus 로고
    • Protection in the Guide object–oriented distributed system
    • LNCS, Springer
    • Daniel Hagimont. Protection in the Guide object–oriented distributed system. In Proc. ECOOP 1994, LNCS, pages 280-298. Springer, 1994.
    • (1994) Proc. ECOOP 1994 , pp. 280-298
    • Hagimont, D.1
  • 11
    • 0017971337 scopus 로고
    • A language extension for expressing constraints on data access
    • May
    • Anita Jones and Barbara Liskov. A language extension for expressing constraints on data access. Communications of the ACM, 21(5):358-367, May 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.5 , pp. 358-367
    • Jones, A.1    Liskov, B.2
  • 13
    • 84958746535 scopus 로고    scopus 로고
    • Authorization in CORBA security
    • Günter Karjoth. Authorization in CORBA security. In Proc. ESORICS’98, pages 143-158, 1998.
    • (1998) Proc. ESORICS’98 , pp. 143-158
    • Karjoth, G.1
  • 14
    • 0002179618 scopus 로고
    • Lampson. Protection
    • January
    • Butler W. Lampson. Protection. ACM Operating Systems Rev., 8(1):18-24, January 1974.
    • (1974) ACM Operating Systems Rev , vol.8 , Issue.1 , pp. 18-24
    • Butler, W.1
  • 18
    • 0026119329 scopus 로고
    • A model of authorization for next-generation database systems
    • March
    • Fausto Rabitti, Elisa Bertino, Won Kim, and Darrel Woelk. A model of authorization for next-generation database systems. ACM Transactions on Database Systems, 16(1):88-131, March 1991.
    • (1991) ACM Transactions on Database Systems , vol.16 , Issue.1 , pp. 88-131
    • Rabitti, F.1    Bertino, E.2    Kim, W.3    Woelk, D.4
  • 19
    • 84976656319 scopus 로고
    • Efficient fine–grained protection for objects
    • Joel Richardson, Peter Schwarz, and Luis-Filipe Cabrera. CACL: Efficient fine–grained protection for objects. In Proc. OOPSLA 1992, pages 263-275, 1992.
    • (1992) Proc. OOPSLA 1992 , pp. 263-275
    • Richardson, J.1    Schwarz, P.2    Cabrera, L.F.3
  • 22
    • 85159685057 scopus 로고    scopus 로고
    • Morris Sloman. Policy driven management for distributed systems. Journal of Network and Systems Management, 2(4), 1994.
    • Sloman, M.1
  • 23
    • 85159691233 scopus 로고    scopus 로고
    • Marc H. Scholl, Christian Laasch, and Markus Tresch. Updatable views in object-oriented databases. In Proc. 2. Int. Conf. on Deductive and Object-Oriented Databases, number 566 in LNCS, pages 189-207, Berlin, Germany, 1991. Springer.
    • Scholl, M.H.1    Laasch, C.2    Tresch, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.