Sciweavers

133 search results - page 2 / 27
» Role-Based Access Control for CORBA Distributed Object Syste...
Sort
View
WETICE
2003
IEEE
13 years 10 months ago
Policy Storage for Role-Based Access Control Systems
Role-based access control has been a focal area for many security researchers over the last decade. There have been a large number of models, and many rich specification language...
András Belokosztolszki, David M. Eyers, Wei...
ISORC
2007
IEEE
13 years 11 months ago
Security Analysis of the Utilization of Corba Object References as Authorization Tokens
In object-oriented real-time computing scenarios, particularly where Corba is used in embedded systems with resource constraints, developers and system architects often utilize Co...
Christoph Becker, Sebastian Staamann, Ralf Salomon
DBSEC
2000
110views Database» more  DBSEC 2000»
13 years 6 months ago
Role-Based Security in a Distributed Resource Environment
There are many technologies for distributed processing/interoperation, including CORBA, DCE, DCOM, Enterprise Java Beans, Java IDL, JDBC, etc. Most promising, is the emergence of ...
Steven A. Demurjian, T. C. Ting, J. Balthazar, H. ...
WISES
2003
13 years 6 months ago
Adding Hard Real-time Capabilities to CORBA
Abstract — Control systems are often software-intensive applications that are becoming extremely complex as new functionality is required. Complexity is a real engineering challe...
Thomas Losert
WETICE
1997
IEEE
13 years 9 months ago
How Role Based Access Control is Implemented in SESAME
In this paper we want to share our experiences with implementing a scheme that enforces role based access control in a distributed, heterogeneous computing environment. This work ...
Mark Vandenwauver, René Govaerts, Joos Vand...