Login / Signup
A proxy-based security architecture for Internet applications in an extranet environment.
Andy Dowling
John G. Keating
Published in:
J. Syst. Softw. (2001)
Keyphrases
</>
security architecture
access control
databases
distributed systems
security policies