Application Security

Joseph Dalton, Ander Hoaglund
{"title":"Application Security","authors":"Joseph Dalton, Ander Hoaglund","doi":"10.4324/9781003126294-13","DOIUrl":null,"url":null,"abstract":"When the time arrives to deploy an application that needs security, it becomes apparent that adding security is much harder than just adding a password protected login screen. This paper contains a collection of patterns for application security. Six patterns are presented in this paper: 1) Secure Access Layer, 2) Single Access Point, 3) Check Point, 4) Roles, 5) Session, and 6) Limited View. Secure Access Layer provides a communication interface for developers and provides a means for applications to use the security of the systems on which they are built. Single Access Point permits entry into the application through one single point. Check Point gives the developer a way to handle different types of security breaches without being too harsh on users who are just making mistakes. Groups of users have different Roles that define what they can and can not do. The global information about the user is distributed throughout the application via a Session. Finall y, users are only presented with legal options through a Limited View. These six patterns work together to provide a security framework for building applications.","PeriodicalId":116149,"journal":{"name":"Implementing Information Security in Healthcare","volume":"102 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Implementing Information Security in Healthcare","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4324/9781003126294-13","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

When the time arrives to deploy an application that needs security, it becomes apparent that adding security is much harder than just adding a password protected login screen. This paper contains a collection of patterns for application security. Six patterns are presented in this paper: 1) Secure Access Layer, 2) Single Access Point, 3) Check Point, 4) Roles, 5) Session, and 6) Limited View. Secure Access Layer provides a communication interface for developers and provides a means for applications to use the security of the systems on which they are built. Single Access Point permits entry into the application through one single point. Check Point gives the developer a way to handle different types of security breaches without being too harsh on users who are just making mistakes. Groups of users have different Roles that define what they can and can not do. The global information about the user is distributed throughout the application via a Session. Finall y, users are only presented with legal options through a Limited View. These six patterns work together to provide a security framework for building applications.
App 保护。
当部署需要安全性的应用程序时,添加安全性显然比添加受密码保护的登录屏幕要困难得多。本文包含应用程序安全性模式的集合。本文提出了六种模式:1)安全访问层,2)单访问点,3)检查点,4)角色,5)会话,6)有限视图。安全访问层为开发人员提供了一个通信接口,并为应用程序提供了一种方法来使用构建它们的系统的安全性。单接入点允许通过一个单点进入应用程序。Check Point为开发人员提供了一种方法来处理不同类型的安全漏洞,而不会对只是犯错误的用户过于苛刻。用户组具有不同的角色,这些角色定义了他们可以做什么和不可以做什么。关于用户的全局信息通过会话分布在整个应用程序中。最后,用户只能通过有限视图看到合法选项。这六个模式一起工作,为构建应用程序提供了一个安全框架。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信