next up previous contents
Next: 5.2.2.8 Authentication Security Exception Up: 5.2.2 OrbixSecurity Previous: 5.2.2.6 How does OrbixSecurity

5.2.2.7 ../images/blueball.gifCan we use Orbix security to provide Access control at Object instance level?