Login / Signup

A proxy-based security architecture for Internet applications in an extranet environment.

Andy DowlingJohn G. Keating
Published in: J. Syst. Softw. (2001)
Keyphrases
  • security architecture
  • access control
  • databases
  • distributed systems
  • security policies