An architecture for enforcing end-to-end access control over web applications.
Boniface HicksSandra Julieta RuedaDave KingThomas MoyerJoshua SchiffmanYogesh SreenivasanPatrick D. McDanielTrent JaegerPublished in: SACMAT (2010)
Keyphrases
- web applications
- end to end
- access control
- application development
- end users
- application developers
- web services
- ad hoc networks
- security policies
- role based access control
- access control policies
- database security
- application layer
- content delivery
- database design
- unauthorized access
- security requirements
- database systems