提炼 发表于 2025-3-23 11:33:07
Authorization in CORBA security,he Object Management Group published a security service specification called CORBA Security to handle security in object systems that conform to the Object Management Architecture. This paper provides a rigorous definition of the authorization part of CORBA Security. Its semantics is given in terms讨厌 发表于 2025-3-23 16:37:34
Rules for designing multilevel Object-Oriented Databases,the design of multilevel OODBs. In an OODB, data are organized in a complex structure built using different constructs (classes, objects, attributes, links ...). Therefore, a first problem is to determine what constructs of the object-oriented model should be associated with a security level. A seco惊奇 发表于 2025-3-23 19:49:34
http://reply.papertrans.cn/24/2339/233879/233879_13.pngObliterate 发表于 2025-3-23 22:26:49
http://reply.papertrans.cn/24/2339/233879/233879_14.pngAGGER 发表于 2025-3-24 04:27:36
EUROMED-JAVA: Trusted Third Party Services for securing medical Java applets,cations among EUROMED participants by establishing Trusted Third Party Services (TTPs) over the Web. Java technology plays an important role in EUROMED. In this paper, the threats that Java technology introduces to EUROMED are explored and security countermeasures are proposed, utilizing the TTP infCriteria 发表于 2025-3-24 06:48:01
http://reply.papertrans.cn/24/2339/233879/233879_16.pngErythropoietin 发表于 2025-3-24 12:46:39
http://reply.papertrans.cn/24/2339/233879/233879_17.png是比赛 发表于 2025-3-24 18:01:41
http://reply.papertrans.cn/24/2339/233879/233879_18.png轿车 发表于 2025-3-24 20:27:01
http://reply.papertrans.cn/24/2339/233879/233879_19.pngobscurity 发表于 2025-3-24 23:49:08
Anne M. Lipton,Cindy D. Marshalle have also to be careful with the inference problems which may occur due to the integrity constraints inherent in the object-oriented paradigm. Therefore, a last purpose of this paper is to define a set of general rules to cope with this problem.