Sciweavers

ISORC
2007
IEEE
14 years 6 months ago
Security Analysis of the Utilization of Corba Object References as Authorization Tokens
In object-oriented real-time computing scenarios, particularly where Corba is used in embedded systems with resource constraints, developers and system architects often utilize Co...
Christoph Becker, Sebastian Staamann, Ralf Salomon