Security Analysis of the Utilization of Corba Object References as Authorization Tokens | IEEE Conference Publication | IEEE Xplore