Performance Considerations for a CORBA-based Application Authorization Service - Konstantin Beznosov et al - Proceedings of IASTED International Conference Software Engineering and Applications, Las Vegas, Nevada: (November, 2000) - LERSSE-RefConfPaper-2005-012
 
<record>
  <controlfield tag="001">70</controlfield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">Authorization</subfield>
  </datafield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">security</subfield>
  </datafield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">application-level security</subfield>
  </datafield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">distributed systems</subfield>
  </datafield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">heterogeneous systems</subfield>
  </datafield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">software engineering</subfield>
  </datafield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">performance evaluation</subfield>
  </datafield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">CORBA</subfield>
  </datafield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">distributed object technology</subfield>
  </datafield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">Engineering Security Mechanisms</subfield>
  </datafield>
</record>