[Next]
[Up]
[Previous]
[Contents]
Next:
4.4.1 [IMAGE ]Where can
Up:
4. CORBASEC specification
Previous:
4.3.9 [IMAGE ]How would
4
.
4
Implementor
4
.
4
.
1
[IMAGE ]Where can I find some source code which implementation Security Service?
4
.
4
.
2
[IMAGE ]Is there any document on how to implement the CORBA security service?
4
.
4
.
3
[IMAGE ]If I want implement the CORBA security service, what should I do?
4
.
4
.
4
What is the intent of the credentials object design?
4
.
4
.
5
[IMAGE ]Does the existing Authorization Service of CORBASec scale in a "well" distributed-object environment?
4
.
4
.
6
Can a client implementation circumvent administrative security policies?
4
.
4
.
7
[IMAGE ]What is the "public" security attribute of a principal?
4
.
4
.
8
[IMAGE ]Under what circumstances do
Credentials
contain the ``public'' attribute?
4
.
4
.
9
[IMAGE ]What is the value and the defining authority of the ``public'' attribute?