Home > Technical Reports > Design and Implementation of Resource Access Decision Server > Keywords |
<record>
<controlfield tag="001">37</controlfield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Authorization</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">access control</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">resource access decision</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">CORBA</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Java security</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">authorization</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">software engineering</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">distributed security</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">distributed systems</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">engineering security mechanisms</subfield>
</datafield>
</record>