Abghour et al., 2002 - Google Patents
DESIGN OF THE LOCAL AUTHORIZATION CHECKERAbghour et al., 2002
View PDF- Document ID
- 17069516216687857901
- Author
- Abghour N
- Deswarte Y
- Nicomette V
- Powell D
- Publication year
External Links
Snippet
The MAFTIA authorization services implement a fine grain protection, ie, capable of protecting each object method invocation, in order to satisfy as much as possible the least privilege principle and to provide the most efficient protection. The authorization services are …
- 239000002131 composite material 0 description 49
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6335972B1 (en) | Framework-based cryptographic key recovery system | |
Karnik et al. | Security in the Ajanta mobile agent system | |
JP4463887B2 (en) | Protected storage of core data secrets | |
US6615350B1 (en) | Module authentication and binding library extensions | |
EP1161715B1 (en) | Communications between modules of a computing apparatus | |
US7526649B2 (en) | Session key exchange | |
Sollins | Cascaded authentication. | |
US9032192B2 (en) | Method and system for policy based authentication | |
US7721100B2 (en) | Granting an access to a computer-based object | |
Deng et al. | Integrating security in CORBA based object architectures | |
JP2001331446A (en) | Secure agent implementation method, secure agent system and secure agent management device | |
Abghour et al. | DESIGN OF THE LOCAL AUTHORIZATION CHECKER | |
Deswarte et al. | An Internet authorization scheme using smart-card-based security kernels | |
Iqbal et al. | Packet level access control scheme for internetwork security | |
Ono et al. | A security scheme for Aglets | |
Johnson et al. | A secure distributed capability based system | |
CN118965335B (en) | Object storage system client authentication method and device, medium, and equipment | |
Dos Santos et al. | Safe areas of computation for secure computing with insecure applications | |
Nicomette et al. | Intrusion-tolerant fine-grained authorization for Internet applications | |
Moore | Network Pump (NP) security target | |
Varadharajan | Distributed object systems security | |
Shepherd et al. | A comprehensive security system—the concepts, agents and protocols | |
Ashley et al. | SESAME | |
Chakravarthy | Policing encrypted data using mobile agents | |
Piessens | Developing Secure Software Applications DRAFT |