By Topic

Authorization schemes for large-scale systems based on Java, CORBA and Web security models

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Westphall, C.M. ; Univ. Fed. de Santa Catarina, Florianopolis, Brazil ; da Silva Fraga, J.

This paper presents an authorization scheme for large-scale networks that involves programming models and tools represented by the Web, Java and CORBA. The authorization scheme is based on structures and concepts introduced in the Web, Java and CORBA for security. A discretionary prototype is presented here, where the solutions adopted involving a concrete scheme are discussed. This scheme was developed in order to simplify authorization policy implementation in these systems. These policies are based on well-known literature security models such as the access matrix model. These security models are adapted in order to elaborate a feasible and practical authorization scheme in which it is easy to define policies to be followed in large-scale distributed systems.

Published in:

Networks, 1999. (ICON '99) Proceedings. IEEE International Conference on

Date of Conference:

28 Sept.-1 Oct. 1999