next up previous
Next: Restrictions specific to PRM Up: An Authorization Framework for Previous: GAA API Security Context

Applying the Distributed Authorization Model to PRM

The objects to be protected in PRM are hosts, however our model is suitable for various applications for which the objects can be files, physical devices, databases etc.



Subsections

Tatyana Ryutov 2002-06-25