[Next] [Up] [Previous] [Contents]
Next: 5.2.2.8 Authentication Security Exception Up: 5.2.2 OrbixSecurity Previous: 5.2.2.6 How does OrbixSecurity

5.2.2.7 [IMAGE ]Can we use Orbix security to provide Access control at Object instance level?