Next:
5.2.2.8 Authentication Security Exception
Up:
5.2.2 OrbixSecurity
Previous:
5.2.2.6 How does OrbixSecurity
5
.
2
.
2
.
7
Can we use Orbix security to provide Access control at Object instance level?