Design patterns: elements of reusable object-oriented software
Design patterns: elements of reusable object-oriented software
Role-Based Access Control Models
Computer
The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Configuring role-based access control to enforce mandatory and discretionary access control policies
ACM Transactions on Information and System Security (TISSEC)
Security and privacy issues in mobile learning
International Journal of Mobile Learning and Organisation
Composing transformations for instrumentation and optimization
PEPM '12 Proceedings of the ACM SIGPLAN 2012 workshop on Partial evaluation and program manipulation
Hi-index | 0.00 |
Large-scale Web-based applications comprise dynamic, extensible and interoperable collections of services, software components and information shared by various entities performing transactional tasks. In defining a general-purpose policy-based security framework, security policies for the confidentiality, integrity and availability of services and information need to be considered. In this paper, policies for authentication, access control, security management, identity administration and accountability are proposed. Implementation mechanisms and component-based generic security services for web-enabled applications are also discussed.