Authorization with security attributes and privilege delegation: Access control beyond the ACL
Analíticas: Mostrar analíticasTipo de contenido:- texto
- sin mediación
- volumen
Contenidos:
En: Computer communications (vol. 20, nro. 5, Jul. 1997), p. 376-384S.T.:H004.7 COM PP2704
This paper focuses on authorization in distributed environments; the typical authorization scheme employs access control lists, however, the scheme has problems when it is applied to a large-scale network. We introduce a new authorization scheme, compare it with the old scheme, and present an implementation of an information server which adopts the new scheme
No hay ítems correspondientes a este registro
This paper focuses on authorization in distributed environments; the typical authorization scheme employs access control lists, however, the scheme has problems when it is applied to a large-scale network. We introduce a new authorization scheme, compare it with the old scheme, and present an implementation of an information server which adopts the new scheme
No hay comentarios en este titulo.
Ingresar a su cuenta para colocar un comentario.