[Next]
[Up]
[Previous]
[Contents]
Next:
4.3.1 What are the
Up:
4. CORBASEC specification
Previous:
4.2.8 What is available
4
.
3
Administrator
4
.
3
.
1
What are the semantic connotations for rights in CORBA rights family?
4
.
3
.
2
How to use the access control mechanism?
4
.
3
.
3
Do I have to "protect" every object, even those which are not thought to be used from outside?
4
.
3
.
4
[IMAGE ]How is related work at OMG on Security Administration and Common Management Facilities ?
4
.
3
.
5
[IMAGE ]What is the granularity of access control on object invocations?
4
.
3
.
6
[IMAGE ]Where are access control lists stored?
4
.
3
.
7
[IMAGE ]How do servers ``know'' what domain to put new objects into and when to create new security policy domains?
4
.
3
.
8
[IMAGE ]What about transient objects created by factories?
4
.
3
.
9
[IMAGE ]How would access control mechanisms be applied to secure, let's say, naming service?