{"title":"Application Security","authors":"Joseph Dalton, Ander Hoaglund","doi":"10.4324/9781003126294-13","DOIUrl":null,"url":null,"abstract":"When the time arrives to deploy an application that needs security, it becomes apparent that adding security is much harder than just adding a password protected login screen. This paper contains a collection of patterns for application security. Six patterns are presented in this paper: 1) Secure Access Layer, 2) Single Access Point, 3) Check Point, 4) Roles, 5) Session, and 6) Limited View. Secure Access Layer provides a communication interface for developers and provides a means for applications to use the security of the systems on which they are built. Single Access Point permits entry into the application through one single point. Check Point gives the developer a way to handle different types of security breaches without being too harsh on users who are just making mistakes. Groups of users have different Roles that define what they can and can not do. The global information about the user is distributed throughout the application via a Session. Finall y, users are only presented with legal options through a Limited View. These six patterns work together to provide a security framework for building applications.","PeriodicalId":116149,"journal":{"name":"Implementing Information Security in Healthcare","volume":"102 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Implementing Information Security in Healthcare","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4324/9781003126294-13","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
When the time arrives to deploy an application that needs security, it becomes apparent that adding security is much harder than just adding a password protected login screen. This paper contains a collection of patterns for application security. Six patterns are presented in this paper: 1) Secure Access Layer, 2) Single Access Point, 3) Check Point, 4) Roles, 5) Session, and 6) Limited View. Secure Access Layer provides a communication interface for developers and provides a means for applications to use the security of the systems on which they are built. Single Access Point permits entry into the application through one single point. Check Point gives the developer a way to handle different types of security breaches without being too harsh on users who are just making mistakes. Groups of users have different Roles that define what they can and can not do. The global information about the user is distributed throughout the application via a Session. Finall y, users are only presented with legal options through a Limited View. These six patterns work together to provide a security framework for building applications.