Map
Index
Random
Help
th

Quote: for extensible systems, separate access control into an enforcement manager and policy manager; inspects extensions for protected types and operations; protection domain transfers and audits

topics > all references > references g-h > QuoteRef: grimR2_2001 , p. abstract



Topic:
extensible systems

Quotation Skeleton

Our access control mechanism decomposes access control into … the absence of security violations. … [p. 37] Our access control mechanism works by inspecting … and method invocation to inject access control [p. 38] operations into the system. … The operations are (1) explicit protection domain transfers … methods can be invoked and which objects can …   Google-1   Google-2

Copyright clearance needed for quotation.


Related Topics up

Topic: extensible systems (22 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.