[go: up one dir, main page]

Abghour et al., 2002 - Google Patents

DESIGN OF THE LOCAL AUTHORIZATION CHECKER

Abghour et al., 2002

View PDF
Document ID
17069516216687857901
Author
Abghour N
Deswarte Y
Nicomette V
Powell D
Publication year

External Links

Snippet

The MAFTIA authorization services implement a fine grain protection, ie, capable of protecting each object method invocation, in order to satisfy as much as possible the least privilege principle and to provide the most efficient protection. The authorization services are …
Continue reading at www.academia.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US6335972B1 (en) Framework-based cryptographic key recovery system
Karnik et al. Security in the Ajanta mobile agent system
JP4463887B2 (en) Protected storage of core data secrets
US6615350B1 (en) Module authentication and binding library extensions
EP1161715B1 (en) Communications between modules of a computing apparatus
US7526649B2 (en) Session key exchange
Sollins Cascaded authentication.
US9032192B2 (en) Method and system for policy based authentication
US7721100B2 (en) Granting an access to a computer-based object
Deng et al. Integrating security in CORBA based object architectures
JP2001331446A (en) Secure agent implementation method, secure agent system and secure agent management device
Abghour et al. DESIGN OF THE LOCAL AUTHORIZATION CHECKER
Deswarte et al. An Internet authorization scheme using smart-card-based security kernels
Iqbal et al. Packet level access control scheme for internetwork security
Ono et al. A security scheme for Aglets
Johnson et al. A secure distributed capability based system
CN118965335B (en) Object storage system client authentication method and device, medium, and equipment
Dos Santos et al. Safe areas of computation for secure computing with insecure applications
Nicomette et al. Intrusion-tolerant fine-grained authorization for Internet applications
Moore Network Pump (NP) security target
Varadharajan Distributed object systems security
Shepherd et al. A comprehensive security system—the concepts, agents and protocols
Ashley et al. SESAME
Chakravarthy Policing encrypted data using mobile agents
Piessens Developing Secure Software Applications DRAFT