NAMING METHOD AND ITS EXTENSION TO AN ACCESS-CONTROL MODEL USING THE GRM

Citation
Wc. Song et al., NAMING METHOD AND ITS EXTENSION TO AN ACCESS-CONTROL MODEL USING THE GRM, Electronics Letters, 33(10), 1997, pp. 838-839
Citations number
4
Categorie Soggetti
Engineering, Eletrical & Electronic
Journal title
ISSN journal
00135194
Volume
33
Issue
10
Year of publication
1997
Pages
838 - 839
Database
ISI
SICI code
0013-5194(1997)33:10<838:NMAIET>2.0.ZU;2-N
Abstract
In the management of globally distributed networks and services, each managed object must be uniquely identified with a globally unique name by managers and be properly access-controlled. The authors propose a solution for global naming and its extension to an access control mode l using the GRM [1]. The global naming method involves use of the rela tionship concept, rather than containment. In the access control model , each managed object class is access-controlled by the characteristic s inherited from a domain class as a superclass in the inheritance tre e of the MIB.