Login / Signup

Method-Specific Java Access Control via RMI Proxy Objects Using Annotations.

Jeff ZarnettPatrick LamMahesh V. Tripunitara
Published in: ICISS (2009)
Keyphrases
  • access control
  • fine grained
  • database
  • metadata
  • domain specific
  • database applications
  • intelligent agents
  • data security
  • database access