Object-oriented Access Control in Jarrah

By: Mark Evered


Given the sensitivity of the data stored in many information systems and the use of networks to support distributed applications, it is increasingly important to enable precise control of who can access the data in what way. Standard per-method access control lists are not sufficient to capture the complexity of the access constraints which arise if the concept of minimal access is taken seriously.

Cite as:

Mark Evered, “Object-oriented Access Control in Jarrah”, Journal of Object Technology, Volume 4, no. 4 (May 2005), pp. 135-153, doi:10.5381/jot.2005.4.4.a3.

PDF | HTML | DOI | BiBTeX | Tweet this | Post to CiteULike | Share on LinkedIn

The JOT Journal   |   ISSN 1660-1769   |   DOI 10.5381/jot   |   AITO   |   Open Access   |    Contact