Citation: | Lang Bo, Wu Qi, Lu You, et al. Flexible access control method of distributed objects[J]. Journal of Beijing University of Aeronautics and Astronautics, 2004, 30(05): 452-455. (in Chinese) |
[1] Object Management Group. CORBA security services specification . http://www.omg.org, 2001,1(7) [2]Iona Company. Iona Programmers'Guide . http://www.iona.comproducts/orbix2000, 2002 [3]Sandhu R S, Samarati P. Access control:principles and practice[J], IEEE Communication Magazine, 1994 , 32 (9):40~48 [4]Timothy J F. An object-oriented framework for security policy representation . Champaign, Iuinois:UIUC,1997 [5]Dirk J, Klaus R D. An approach for building secure database federations . In :Proc.Int'l. Conf. On Very Large Data Bases .San Francisco:Morgan Kaufmann Publishers Inc,1994.24~35 [6]Rabitti F, Bertino E, Kim W,et al. A model of authorization for next-generation database systems[J]. ACM Trans. On Database Systems, 1991,16(1):89~131
|