منابع مشابه
Object-oriented Access Control in Jarrah
Given the sensitivity of the data stored in many information systems and the use of networks to support distributed applications, it is increasingly important to enable precise control of who can access the data in what way. Standard per-method access control lists are not sufficient to capture the complexity of the access constraints which arise if the concept of minimal access is taken seriou...
متن کاملObject and Access Evolution in Jarrah
Persistent object evolution is at least as important as evolution at the system level since an object may outlive a system in which it is used and may be used in many systems concurrently. The programming language Jarrah is a Java extension supporting secure persistent objects and fine-grained access control to these objects. In this paper we describe the persistence and access control construc...
متن کاملAccess Control in an Object-Oriented Document Repository
The approach presented in this paper aims at combining the advances of a sophisticated document repository with a flexible access control mechanism. It proposes an authorization model for hypertext documents stored in an object-oriented database system (ODBMS). The work is based on the idea of an ODBMS working as an Internet server for hypermedia documents. The approach introduced offers fine g...
متن کاملCapability-Based Primitives for Access Control in Object-Oriented Systems
Access control is the cornerstone of information security and integrity, but the semantic diversity of object models makes it di cult to provide a common foundation for access control in objectoriented systems. This paper presents a primitive capability-based access control architecture that can model a variety of authorization policies for object-oriented systems. The architecture described is...
متن کاملPurpose-Oriented Access Control Model in Object-Based Systems
In distributed applications, a group of multiple objects are cooperating to achieve some objectives by exchanging messages through communication networks. An object is modeled as a pair of data structure and operations. In the cooperation among multiple objects, it is important to protect against illegal information ow among the objects. In this paper, we discuss an access control model for an ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Object Technology
سال: 2005
ISSN: 1660-1769
DOI: 10.5381/jot.2005.4.4.a3