Authorization with security attributes and privilege delegation: Access control beyond the ACL

Por: Colaborador(es): Analíticas: Mostrar analíticasTipo de contenido:
  • texto
Tipo de medio:
  • sin mediación
Tipo de soporte:
  • volumen
Tema(s):
Contenidos:
This paper focuses on authorization in distributed environments; the typical authorization scheme employs access control lists, however, the scheme has problems when it is applied to a large-scale network. We introduce a new authorization scheme, compare it with the old scheme, and present an implementation of an information server which adopts the new scheme
En: Computer communications (vol. 20, nro. 5, Jul. 1997), p. 376-384S.T.:H004.7 COM PP2704
Valoración
    Valoración media: 0.0 (0 votos)
No hay ítems correspondientes a este registro

This paper focuses on authorization in distributed environments; the typical authorization scheme employs access control lists, however, the scheme has problems when it is applied to a large-scale network. We introduce a new authorization scheme, compare it with the old scheme, and present an implementation of an information server which adopts the new scheme

No hay comentarios en este titulo.

para colocar un comentario.