Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks
- 1 January 1999
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- Channel reification: a reflective model for distributed computationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Exception-based information flow control in object-oriented systemsACM Transactions on Information and System Security, 1998
- Evaluation of Object-Oriented Reflective ModelsPublished by Springer Nature ,1998
- Determining role rights from use casesPublished by Association for Computing Machinery (ACM) ,1997
- Role-based access control modelsComputer, 1996
- A Method-Based Authorization Model for Object-Oriented DatabasesPublished by Springer Nature ,1994
- Adaptability using reflectionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1994
- Concepts and experiments in computational reflectionACM SIGPLAN Notices, 1987
- Protection in operating systemsCommunications of the ACM, 1976
- ProtectionACM SIGOPS Operating Systems Review, 1974