Security models for web-based applications
- 1 February 2001
- journal article
- Published by Association for Computing Machinery (ACM) in Communications of the ACM
- Vol. 44 (2) , 38-44
- https://doi.org/10.1145/359205.359224
Abstract
Using traditional and emerging access control approaches to develop secure applications for the WebKeywords
This publication has 7 references indexed in Scilit:
- Protecting information on the WebCommunications of the ACM, 2000
- The specification and enforcement of authorization constraints in workflow management systemsACM Transactions on Information and System Security, 1999
- A role-based access control model and reference implementation within a corporate intranetACM Transactions on Information and System Security, 1999
- Using public-key infrastructures for security and risk managementIEEE Communications Magazine, 1999
- A role-based access control for intranet securityIEEE Internet Computing, 1997
- Lattice-based access control modelsComputer, 1993
- Protection in operating systemsCommunications of the ACM, 1976