Next:
4.3.1 What are the
Up:
4. CORBASEC specification
Previous:
4.2.8 What is available
4
.
3
Administrator
4
.
3
.
1
What are the semantic connotations for rights in CORBA rights family?
4
.
3
.
2
How to use the access control mechanism?
4
.
3
.
3
Do I have to "protect" every object, even those which are not thought to be used from outside?
4
.
3
.
4
How is related work at OMG on Security Administration and Common Management Facilities ?
4
.
3
.
5
What is the granularity of access control on object invocations?
4
.
3
.
6
Where are access control lists stored?
4
.
3
.
7
How do servers ``know'' what domain to put new objects into and when to create new security policy domains?
4
.
3
.
8
What about transient objects created by factories?
4
.
3
.
9
How would access control mechanisms be applied to secure, let's say, naming service?