[go: up one dir, main page]

Nardone et al., 2023 - Google Patents

Spring Security Architecture and Design

Nardone et al., 2023

Document ID
12935170411324982473
Author
Nardone M
Scarioni C
Publication year
Publication venue
Pro Spring Security: Securing Spring Framework 6 and Boot 3-based Java Applications

External Links

Snippet

In Chapter 3, you developed an initial application secured with Spring Security. You got an overview of how this application worked and looked at some of the Spring Security components put into action in common Spring Security–secured applications. This chapter …
Continue reading at link.springer.com (other versions)

Similar Documents

Publication Publication Date Title
Scarioni Pro Spring Security
US9805172B2 (en) System and methods of resource usage using an interoperable management framework
JP2004164600A (en) Method and system for applying consent policy of online identity
NZ533955A (en) Delegated administration of a hosted resource
Burt et al. Model driven security: unification of authorization models for fine-grain access control
Dikanski et al. Identification and implementation of authentication and authorization patterns in the spring security framework
Emig et al. Identity as a service–towards a service-oriented identity management architecture
Hummer et al. An integrated approach for identity and access management in a SOA context
Ziebermayr et al. Web service authorization framework
Nardone et al. Spring Security Architecture and Design
Scarioni et al. Spring Security Architecture and Design
Knutson et al. Spring Security: Secure your web applications, RESTful services, and microservice architectures
Alam et al. Constraint based role based access control in the sectet-framework: A model-driven approach
Ayoubi et al. New XACML-AspectBPEL approach for composite web services security
Fatema et al. A multi-privacy policy enforcement system
Rauf et al. Towards a model-driven security assurance of open source components
Scarioni Spring Security Architecture and Design
Mourad et al. New approach for the dynamic enforcement of Web services security
Gaedke et al. Aspects of service‐oriented component procurement in web‐based information systems
Nasslahsen Spring Security: Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures
Winch et al. Spring Security 3.1
Lamouchi Adding Anti-Disaster Layers
Myllärniemi et al. Approach for dynamically composing decentralised service architectures with cross-cutting constraints
Cosmina et al. Securing Spring Web Applications
Scarioni et al. Customizing and Extending Spring Security