Back to Security Pattern Catalog
: Perimeter Security
Systems often express their requirements as policies. However, the policy has to be enforced to check conformance. The policy enforcement functions have to be invoked in a correct sequence.
How can the policy decisions be effectively evaluated?
Isolate the part that makes policy enforcement decision in a discrete component of the system. Ensure that policy enforcement activities are performed in proper sequence.
Client Secure Invocation Policy and Server Secure Invocation Policy in CORBA.
Role Based Access Control, Policy Enforcement Point
Open Group Catalog
Access Control, Policy
Last modified: May 05, 2012
and Maintained by: Munawar Hafiz