2000
DOI: 10.1016/s1383-7621(00)00017-5
|View full text |Cite
|
Sign up to set email alerts
|

Role-based access control in DCOM

Abstract: The explosive growth of the Web, the increasing popularity of PCs and the advances in high-speed network access have brought distributed computing into the mainstream. To simplify network programming and to realize componentbased software architecture, distributed object models have emerged as standards. One of those models is distributed component object model (DCOM) which is a protocol that enables software components to communicate directly over a network in a reliable, and e cient manner. In this paper, we… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
6
0

Year Published

2003
2003
2011
2011

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…The work most relevant to ours addresses support for RBAC in middleware. Ahn (2000) outlines a proposal for enforcing RBAC policies for distributed applications that utilize Microsoft's Distributed Component Object Model (DCOM) (Brown & Kindel, 1998;Microsoft, 1998). His proposal employs the following elements of Windows NT's architecture: (1) a registry for storing and maintaining the role hierarchy and permission-to-role assignment (PA); (2) user groups for simulating roles and maintaining user-to-role assignment (UA); and…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The work most relevant to ours addresses support for RBAC in middleware. Ahn (2000) outlines a proposal for enforcing RBAC policies for distributed applications that utilize Microsoft's Distributed Component Object Model (DCOM) (Brown & Kindel, 1998;Microsoft, 1998). His proposal employs the following elements of Windows NT's architecture: (1) a registry for storing and maintaining the role hierarchy and permission-to-role assignment (PA); (2) user groups for simulating roles and maintaining user-to-role assignment (UA); and…”
Section: Related Workmentioning
confidence: 99%
“…(3) a custom built security provider that follows the RBAC model to make access control decisions, which are requested and enforced by the DCOM run-time. Since the support for role hierarchy is indicated, but not explained, by Ahn (2000), we assume that the Windows NT registry can be used to encode the hierarchy so that the RBAC security provider can refer to it while making authorization decisions. Similar to the proposals for RBAC support in operating systems, the use of OS user groups for simulating roles enables activation of more than one role.…”
Section: Related Workmentioning
confidence: 99%
“…The work most relevant to ours addresses support for RBAC in middleware. Ahn [57] outlines a proposal for enforcing RBAC policies for distributed applications that utilize Microsoft's Distributed Component Object Model (DCOM) [29,58]. His proposal employs the following elements of Windows NT's architecture: (1) registry for storing and maintaining the role hierarchy, and permission-to-role assignment (PA), (2) user groups for simulating roles and maintaining user-to-role assignment (UA), and (3) a custom-built security provider that follows the RBAC model to make access control decisions, which are requested and enforced by the DCOM run-time.…”
Section: Related Workmentioning
confidence: 99%
“…His proposal employs the following elements of Windows NT's architecture: (1) registry for storing and maintaining the role hierarchy, and permission-to-role assignment (PA), (2) user groups for simulating roles and maintaining user-to-role assignment (UA), and (3) a custom-built security provider that follows the RBAC model to make access control decisions, which are requested and enforced by the DCOM run-time. Since the support for role hierarchy is indicated but not explained in [57], we assume that the Windows NT registry can be used to encode the hierarchy so that the RBAC security provider can refer to it while making authorization decisions. Similar to the proposals for RBAC support in operating systems, the use of OS user groups for simulating roles enables activation of more than one role.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation