By Topic

Naming method and its extension to an access control model using the GRM

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $33
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Wang-Cheol Song ; Dept. of Inf. Eng., Cheju Univ. ; Lee-Hyun Baek ; Chang-Eon Kang

In the management of globally distributed networks and services, each managed object must be uniquely identified with a globally unique name by managers and be properly access-controlled. The authors propose a solution for global naming and its extension to an access control model using the GRM (General Relationship Model). The global naming method involves use of the relationship concept, rather than containment. In the access model, each managed object class is access controlled by the characteristics inherited from a domain class as a superclass in the inheritance tree of the MIB (Management Information Base)

Published in:

Electronics Letters  (Volume:33 ,  Issue: 10 )