ACCESS CONTROL TO GUARDED OBJECTS
In one example, a computer implemented method may include designating a configurable object as a guarded object to restrict access to the configurable object. Further, the method may include receiving a request to access the guarded object and determining whether the request is received from a user...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | In one example, a computer implemented method may include designating a configurable object as a guarded object to restrict access to the configurable object. Further, the method may include receiving a request to access the guarded object and determining whether the request is received from a user having a privilege to access the guarded object. Furthermore, the method may include controlling the access to the guarded object based on the determination. |
---|