1996
DOI: 10.1007/978-0-387-34932-9_6
|View full text |Cite
|
Sign up to set email alerts
|

URBS Enforcement Mechanisms for Object-Oriented Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
13
0

Year Published

1996
1996
1999
1999

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(13 citation statements)
references
References 8 publications
0
13
0
Order By: Relevance
“…In this section, two approaches to generating code for an RBAC enforcement mechanism, as given in [DEMU95], are briefly reviewed using the HCA example from Section 2.0. These approaches function under the assumption that there is no user code involved in the system, i.e., a static system.…”
Section: Two Approaches To Rbacmentioning
confidence: 99%
See 4 more Smart Citations
“…In this section, two approaches to generating code for an RBAC enforcement mechanism, as given in [DEMU95], are briefly reviewed using the HCA example from Section 2.0. These approaches function under the assumption that there is no user code involved in the system, i.e., a static system.…”
Section: Two Approaches To Rbacmentioning
confidence: 99%
“…The work in [DEMU95] was based on a proposal [DEMU94] that security definition and enforcement for object-oriented systems must be consistent with its precepts and principles, including public/private II-83 interfaces, encapsulation, information hiding, inheritance, polymorphism, dispatching, overloading, software reuse, software evolution, and extensibility. Two approaches proposed in [DEMU9.5] targeted extensible and reusable C+ + RBAC mechanisms that try to insulate the software engineer from security considerations while simultaneously ensuring that the object-oriented system enforces the required RBAC.…”
mentioning
confidence: 99%
See 3 more Smart Citations