完整後設資料紀錄
DC 欄位語言
dc.contributor.authorAhn, Gail-Joon
dc.contributor.authorSandhu, Ravi
dc.date.accessioned2009-08-23T04:40:05Z
dc.date.accessioned2020-05-25T06:23:55Z-
dc.date.available2009-08-23T04:40:05Z
dc.date.available2020-05-25T06:23:55Z-
dc.date.issued2006-10-20T02:55:01Z
dc.date.submitted1998-12-17
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/2038-
dc.description.abstractThe explosive growth of the Web, the increasing popularity of PCs and the anvances in high-speed network access have brought distributed computing into the mainstream. To simplify network programming and to realize component-based software architectures, distributed objects models have emerged as standards. One of those models is DCOM (Distributed Component Object Model) which is a protocol that enables software components to communicate directly over a network in a reliable, and efficient manner. In this paper, we investigate an aspect of DCOM concerning software architecture and secutiry mechanism. Also, we describe the concept of role-based access control (RBAC) which began with multi-user and multi-application on-line systems pioneered in the 1970s. And we investigate how we can enforce the role-based access control as a security provider within DCOM, specially in access security policy.
dc.description.sponsorship成功大學,台南市
dc.format.extent8p.
dc.format.extent632106 bytes
dc.format.mimetypeapplication/pdf
dc.language.isozh_TW
dc.relation.ispartofseries1998 ICS會議
dc.subject.otherNetworks Security
dc.titleSECURITY ARCHITECTURE OF DCOM AND ITS INTERGRATION WITH RBAC
分類:1998年 ICS 國際計算機會議

文件中的檔案:
檔案 描述 大小格式 
ce07ics001998000105.pdf617.29 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。