Access Control Architectures: COM+ vs. EJB. Beznosov, K. Dec, 2004.
Paper abstract bibtex This tutorial provides an overview of access control mechanisms in two most popular commercial middleware technologies, COM+ and EJB. Three main aspects of the mechanisms are explained: a) how enforcement of the access control policies is done, b) the main elements of each technology access control model, and c) the types of policies supported. The technologies are compared, in respect to access control, against each other. Their advantages and disadvantages are discussed.
@Misc{Konstantin:16,
author = {Konstantin Beznosov},
month = {Dec},
title = {{A}ccess {C}ontrol {A}rchitectures: {C}OM+ vs. {E}JB},
year = {2004},
abstract = {This tutorial provides an overview of access control mechanisms in two most popular commercial middleware technologies, COM+ and EJB. Three main aspects of the mechanisms are explained: a) how enforcement of the access control policies is done, b) the main elements of each technology access control model, and c) the types of policies supported. The technologies are compared, in respect to access control, against each other. Their advantages and disadvantages are discussed.},
url = {https://drive.google.com/file/d/1lGO_MCnF7tC1Llq5eCKCONsMU-6XMySq/view?usp=drive_link},
}
Downloads: 0
{"_id":"fuGMnqqpoMY4FgCGN","bibbaseid":"beznosov-accesscontrolarchitecturescomvsejb-2004","author_short":["Beznosov, K."],"bibdata":{"bibtype":"misc","type":"misc","author":[{"firstnames":["Konstantin"],"propositions":[],"lastnames":["Beznosov"],"suffixes":[]}],"month":"Dec","title":"Access Control Architectures: COM+ vs. EJB","year":"2004","abstract":"This tutorial provides an overview of access control mechanisms in two most popular commercial middleware technologies, COM+ and EJB. Three main aspects of the mechanisms are explained: a) how enforcement of the access control policies is done, b) the main elements of each technology access control model, and c) the types of policies supported. The technologies are compared, in respect to access control, against each other. Their advantages and disadvantages are discussed.","url":"https://drive.google.com/file/d/1lGO_MCnF7tC1Llq5eCKCONsMU-6XMySq/view?usp=drive_link","bibtex":"@Misc{Konstantin:16,\n author = {Konstantin Beznosov},\n month = {Dec},\n title = {{A}ccess {C}ontrol {A}rchitectures: {C}OM+ vs. {E}JB},\n year = {2004},\n abstract = {This tutorial provides an overview of access control mechanisms in two most popular commercial middleware technologies, COM+ and EJB. Three main aspects of the mechanisms are explained: a) how enforcement of the access control policies is done, b) the main elements of each technology access control model, and c) the types of policies supported. The technologies are compared, in respect to access control, against each other. Their advantages and disadvantages are discussed.},\n url = {https://drive.google.com/file/d/1lGO_MCnF7tC1Llq5eCKCONsMU-6XMySq/view?usp=drive_link},\n}\n\n","author_short":["Beznosov, K."],"key":"Konstantin:16","id":"Konstantin:16","bibbaseid":"beznosov-accesscontrolarchitecturescomvsejb-2004","role":"author","urls":{"Paper":"https://drive.google.com/file/d/1lGO_MCnF7tC1Llq5eCKCONsMU-6XMySq/view?usp=drive_link"},"metadata":{"authorlinks":{}}},"bibtype":"misc","biburl":"https://bibbase.org/f/i3hTAQ2wxvvLpcpZu/lersse_publications.bib","dataSources":["gKAKkjtPkN44YFKMk","nDjRsp2dBrEbdKR78","Raz2SaaZA89irapRN","ZnaQsM7NDPZR4BFeb"],"keywords":[],"search_terms":["access","control","architectures","com","ejb","beznosov"],"title":"Access Control Architectures: COM+ vs. EJB","year":2004}