By Topic

Authorization model based on object-oriented concept

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Izaki, K. ; Dept. of Comput. & Syst. Eng., Tokyo Denki Univ., Japan ; Tanaka, K. ; Takizawa, M.

In object-oriented systems, classes and objects are hierarchically structured in instance-of, is-a, and part-of relations. Data and methods of a class are inherited by lower-level classes according to the is-a hierarchical structure. Access rules on classes are specified to make sure that only authorized subjects manipulate objects in authorized ways. It is difficult to specify access rules for every class and object, because the system is composed of various types of classes, and objects which are dynamically created and dropped. If access rules on some class could be reused for other classes, the access rules are easily specified. This paper discusses how to inherit access rules in the hierarchical structure of classes and objects

Published in:

Information Networking, 2001. Proceedings. 15th International Conference on

Date of Conference: