Taming access control security: extending capabilities using the views relationship

The ‘views’ relationship indicates how an object‐oriented design can be clearly separated into objects and their corresponding interface. This paper uses the concept of ‘views’ in order to achieve full separation between the application and the security policy in the design and implementation. The r...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Software, practice & experience Ročník 32; číslo 4; s. 341 - 358
Hlavní autori: Markiewicz, Marcus E., Lucena, Carlos J. P., Cowan, Donald D.
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Chichester, UK John Wiley & Sons, Ltd 10.04.2002
Predmet:
ISSN:0038-0644, 1097-024X
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract The ‘views’ relationship indicates how an object‐oriented design can be clearly separated into objects and their corresponding interface. This paper uses the concept of ‘views’ in order to achieve full separation between the application and the security policy in the design and implementation. The result is achieved by providing a model for capabilities using ‘views’ that is richer than the traditional capability model. In addition, a distributed access control model is shown to be effective through the use of Secure Object Communication Channels (SOCCs) to allow for secure connections at the object level. This security is applicable in the e‐commerce application domain, bringing security directly to the application ion level. Copyright © 2002 John Wiley & Sons, Ltd.
AbstractList The ‘views’ relationship indicates how an object‐oriented design can be clearly separated into objects and their corresponding interface. This paper uses the concept of ‘views’ in order to achieve full separation between the application and the security policy in the design and implementation. The result is achieved by providing a model for capabilities using ‘views’ that is richer than the traditional capability model. In addition, a distributed access control model is shown to be effective through the use of Secure Object Communication Channels (SOCCs) to allow for secure connections at the object level. This security is applicable in the e‐commerce application domain, bringing security directly to the application ion level. Copyright © 2002 John Wiley & Sons, Ltd.
The ‘views’ relationship indicates how an object‐oriented design can be clearly separated into objects and their corresponding interface. This paper uses the concept of ‘views’ in order to achieve full separation between the application and the security policy in the design and implementation. The result is achieved by providing a model for capabilities using ‘views’ that is richer than the traditional capability model. In addition, a distributed access control model is shown to be effective through the use of Secure Object Communication Channels (SOCCs) to allow for secure connections at the abstract object level. This security is applicable in the e‐commerce application domain, bringing security directly to the application abstraction level. Copyright © 2002 John Wiley & Sons, Ltd.
The 'views' relationship indicates how an object-oriented design can be clearly separated into objects and their corresponding interface. This paper uses the concept of 'views' in order to achieve full separation between the application and the security policy in the design and implementation. The result is achieved by providing a model for capabilities using 'views' that is richer than the traditional capability model. In addition, a distributed access control model is shown to be effective through the use of Secure Object Communication Channels (SOCCs) to allow for secure connections at the abstract object level. This security is applicable in the e-commerce application domain, bringing security directly to the application abstraction level. Copyright copyright 2002 John Wiley & Sons, Ltd.
The "views" relationship indicates how an object-oriented design can be clearly separated into objects and their corresponding interface. This paper uses the concept of "views" to achieve full separation between the application and the security policy in the design and implementation. In addition, a distributed access control model is shown to be effective through the use of Secure Object Communication Channels (SOCCs) to provide security during transmission, since the data is encrypted and thus protected from eavesdroppers. The architectures presented in this paper allow any e-commerce or web application to have proper security at the abstract design level. (Original abstract - amended)
Author Markiewicz, Marcus E.
Lucena, Carlos J. P.
Cowan, Donald D.
Author_xml – sequence: 1
  givenname: Marcus E.
  surname: Markiewicz
  fullname: Markiewicz, Marcus E.
  email: mem@acm.org
  organization: Laboratório de Engenharia de Software (LES), Departamento de Informática, Pontifícia Universidade Católica, Rio de Janeiro 22460, RJ, Brazil
– sequence: 2
  givenname: Carlos J. P.
  surname: Lucena
  fullname: Lucena, Carlos J. P.
  organization: Laboratório de Engenharia de Software (LES), Departamento de Informática, Pontifícia Universidade Católica, Rio de Janeiro 22460, RJ, Brazil
– sequence: 3
  givenname: Donald D.
  surname: Cowan
  fullname: Cowan, Donald D.
  organization: Computer Science Department and Computer Systems Group, University of Waterloo, Waterloo, Ontario N2L 3G1, Canada
BookMark eNqN0E1Lw0AQBuBFFGxV_As56UGi-5Xd1JuIVqH41YriZVk3E7uaJnEnUfvvTYl4E5zDDAwPw_AOyXpZlUDILqOHjFJ-hDUcSknXyIDRkY4pl4_rZECpSGOqpNwkQ8RXShlLuBqQ6cwufPkSWecAMXJV2YSqiBBcG3yzPI7gq4EyWxFna_vsC994wKjF1aqZQ_Th4ROjAIVtfFXi3NfbZCO3BcLOz9wi9-dns9OLeHI9vjw9mcROcEbjNNFWulRJkWe2e1PkLusaBwYZTxOW58_WpQISpUFa5WzGrRaUs9wKN5K52CJ7_d06VO8tYGMWHh0UhS2hatFw3RUbqX_BJFVpB_d76EKFGCA3dfALG5aGUbNK13Tpmi7dTh708tMXsPyLmenNWa_jXnts4OtX2_BmlBY6MQ9XY5Mq_TQb8ztzK74Bzg-NYQ
Cites_doi 10.1145/242224.242413
10.1002/spe.4380230304
10.17487/rfc2246
10.1002/(SICI)1096-9942(1996)2:3<143::AID-TAPO2>3.0.CO;2-X
10.1145/320384.320420
10.1093/comjnl/29.4.289
10.1145/359340.359342
10.1145/167962.165932
10.1109/32.372150
10.1145/361598.361623
ContentType Journal Article
Copyright Copyright © 2002 John Wiley & Sons, Ltd.
Copyright_xml – notice: Copyright © 2002 John Wiley & Sons, Ltd.
DBID BSCLL
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
F28
FR3
DOI 10.1002/spe.440
DatabaseName Istex
CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
DatabaseTitleList
CrossRef
Computer and Information Systems Abstracts
Technology Research Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1097-024X
EndPage 358
ExternalDocumentID 10_1002_spe_440
SPE440
ark_67375_WNG_867ZTG2R_Q
Genre article
GroupedDBID -~X
.3N
.DC
.GA
.Y3
05W
0R~
10A
123
1L6
1OB
1OC
31~
33P
3R3
3SF
3WU
4.4
4ZD
50Y
50Z
51W
51X
52M
52N
52O
52P
52S
52T
52U
52W
52X
5VS
66C
702
7PT
8-0
8-1
8-3
8-4
8-5
85S
8UM
930
9M8
A03
AAESR
AAEVG
AAHQN
AAMMB
AAMNL
AANHP
AANLZ
AAONW
AASGY
AAXRX
AAYCA
AAZKR
ABCQN
ABCUV
ABEFU
ABIJN
ABLJU
ABUFD
ACAHQ
ACBWZ
ACCZN
ACFBH
ACGFS
ACIWK
ACNCT
ACPOU
ACRPL
ACXBN
ACXQS
ACYXJ
ADBBV
ADEOM
ADIZJ
ADKYN
ADMGS
ADNMO
ADOZA
ADXAS
ADZMN
AEFGJ
AEIGN
AEIMD
AENEX
AEUYR
AEYWJ
AFBPY
AFFPM
AFGKR
AFWVQ
AFZJQ
AGQPQ
AGXDD
AGYGG
AHBTC
AIDQK
AIDYY
AITYG
AIURR
ALAGY
ALMA_UNASSIGNED_HOLDINGS
ALVPJ
AMBMR
AMYDB
ASPBG
ATUGU
AUFTA
AVWKF
AZBYB
AZFZN
AZVAB
BAFTC
BDRZF
BFHJK
BHBCM
BMNLL
BNHUX
BROTX
BRXPI
BSCLL
BY8
CS3
D-E
D-F
D0L
DCZOG
DPXWK
DR2
DRFUL
DRSTM
DU5
EBS
EJD
F00
F01
F04
FEDTE
G-S
G.N
GNP
GODZA
H.T
H.X
HBH
HGLYW
HHY
HVGLF
HZ~
IX1
J0M
JPC
KQQ
LATKE
LAW
LC2
LC3
LEEKS
LH4
LITHE
LOXES
LP6
LP7
LUTES
LW6
LYRES
MEWTI
MK4
MRFUL
MRSTM
MSFUL
MSSTM
MXFUL
MXSTM
N04
N05
N9A
NF~
NNB
O66
O9-
OIG
P2P
P2W
P2X
P4D
PQQKQ
PZZ
Q.N
Q11
QB0
QRW
R.K
ROL
RX1
RXW
S10
SUPJJ
TWZ
UB1
V2E
W8V
W99
WBKPD
WH7
WIB
WIH
WIK
WOHZO
WQJ
WXSBR
WYISQ
WZISG
XG1
XPP
XV2
YYP
ZCA
ZY4
ZZTAW
~02
~IA
~WT
AAHHS
ABTAH
ACCFJ
AEEZP
AEQDE
AEUQT
AFPWT
AIWBW
AJBDE
ALUQN
RWI
WRC
WWW
AAYXX
CITATION
O8X
7SC
8FD
JQ2
L7M
L~C
L~D
F28
FR3
ID FETCH-LOGICAL-c3210-857a4c8643fda0243fcd43f2e1ed2851ffbac83e567e4a6cad2a73021fa3c94f3
IEDL.DBID DRFUL
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000174649500002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0038-0644
IngestDate Sun Nov 09 10:33:11 EST 2025
Fri Jul 11 10:48:52 EDT 2025
Sat Nov 29 04:02:25 EST 2025
Wed Jan 22 16:32:52 EST 2025
Tue Nov 11 03:32:20 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
License http://onlinelibrary.wiley.com/termsAndConditions#vor
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c3210-857a4c8643fda0243fcd43f2e1ed2851ffbac83e567e4a6cad2a73021fa3c94f3
Notes istex:E16F3EE8D19DB27E74096C7F66A0F785A9CC53C4
ark:/67375/WNG-867ZTG2R-Q
ArticleID:SPE440
ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
PQID 27775868
PQPubID 23500
PageCount 18
ParticipantIDs proquest_miscellaneous_27777196
proquest_miscellaneous_27775868
crossref_primary_10_1002_spe_440
wiley_primary_10_1002_spe_440_SPE440
istex_primary_ark_67375_WNG_867ZTG2R_Q
PublicationCentury 2000
PublicationDate 10 April 2002
PublicationDateYYYYMMDD 2002-04-10
PublicationDate_xml – month: 04
  year: 2002
  text: 10 April 2002
  day: 10
PublicationDecade 2000
PublicationPlace Chichester, UK
PublicationPlace_xml – name: Chichester, UK
PublicationTitle Software, practice & experience
PublicationTitleAlternate Softw: Pract. Exper
PublicationYear 2002
Publisher John Wiley & Sons, Ltd
Publisher_xml – name: John Wiley & Sons, Ltd
References Booch G, Jacobson I, Rumbaugh J. The Unified Modeling Language User Guide. Addison-Wesley, 1998.
Parnas D. On the criteria to be used in decomposing systems into modules. Communications of the ACM 1972; 15:1053-1058.
Menezes AJ, Oorschot PC, Vantone SA. Handbook of Applied Cryptography. CRC Press: Boca Raton, FL, 1996.
Cowan DD, Ierusalimschy R, Lucena CJP, Stepien TM. Abstract data views. Structured Programming 1993; 14:1-13.
Buschmann F, Meunier R, Rohnert H, Sommerlad P, Stal M. Pattern-Oriented Software Architecture: A System of Patterns. Addison-Wesley, 1996.
Kristensen K, Osterbye BB. Roles: Conceptual abstraction theory and practical language issues. Theory and Practice of Object Systems 1996; 3(2):143-160.
Stallings W. Cryptography and Network Security: Principles and Practice (2nd edn). Prentice Hall, 1998.
Mullender SJ, Tanenbaum ASThe design of a capability-based distributed operating system. The Computer Journal 1986; 29:289-300.
Adams C, Lloyd S. Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations (1st edn). Macmillan, 1999.
Rivest RL, Shamir A, Adleman LA. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978; 21(2):S120-126.
Cowan DD, Lucena CJP. Abstract data views: An interface specification concept to enhance design for reuse. IEEE Transactions on Software Engineering 1995; 21:229-243.
Cowan DD, Stepien TM, Ierusalimschy R, Lucena CJP. Application integration: Constructing composite applications from interactive components. Software Practice and Experience 1993; 23:255-275.
Schneider B. Applied Cryptography: Protocol, Algorithms and Source Code in C (2nd edn). Wiley, 1996.
Gamma E, Helm R, Johnson R, Vlissides J. Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, 1994.
1993; 14
1993; 23
2000
1978; 21
1995; 21
1998
1997
1996
1986; 29
1995
1994
1993
1996; 3
1999
1972; 15
Menezes AJ (e_1_2_1_26_2)
Booch G (e_1_2_1_11_2) 1998
Schneider B (e_1_2_1_25_2) 1996
Gamma E (e_1_2_1_21_2) 1994
e_1_2_1_22_2
e_1_2_1_20_2
e_1_2_1_27_2
e_1_2_1_24_2
e_1_2_1_28_2
Adams C (e_1_2_1_23_2) 1999
Buschmann F (e_1_2_1_32_2)
e_1_2_1_6_2
e_1_2_1_30_2
e_1_2_1_7_2
Riechmann T (e_1_2_1_14_2) 1998
e_1_2_1_4_2
e_1_2_1_5_2
e_1_2_1_2_2
e_1_2_1_3_2
e_1_2_1_12_2
e_1_2_1_10_2
e_1_2_1_31_2
e_1_2_1_15_2
Cowan DD (e_1_2_1_18_2) 1993; 14
e_1_2_1_16_2
e_1_2_1_13_2
e_1_2_1_19_2
e_1_2_1_8_2
e_1_2_1_17_2
e_1_2_1_9_2
Stallings W (e_1_2_1_29_2)
References_xml – reference: Kristensen K, Osterbye BB. Roles: Conceptual abstraction theory and practical language issues. Theory and Practice of Object Systems 1996; 3(2):143-160.
– reference: Schneider B. Applied Cryptography: Protocol, Algorithms and Source Code in C (2nd edn). Wiley, 1996.
– reference: Mullender SJ, Tanenbaum ASThe design of a capability-based distributed operating system. The Computer Journal 1986; 29:289-300.
– reference: Adams C, Lloyd S. Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations (1st edn). Macmillan, 1999.
– reference: Stallings W. Cryptography and Network Security: Principles and Practice (2nd edn). Prentice Hall, 1998.
– reference: Buschmann F, Meunier R, Rohnert H, Sommerlad P, Stal M. Pattern-Oriented Software Architecture: A System of Patterns. Addison-Wesley, 1996.
– reference: Rivest RL, Shamir A, Adleman LA. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978; 21(2):S120-126.
– reference: Cowan DD, Stepien TM, Ierusalimschy R, Lucena CJP. Application integration: Constructing composite applications from interactive components. Software Practice and Experience 1993; 23:255-275.
– reference: Parnas D. On the criteria to be used in decomposing systems into modules. Communications of the ACM 1972; 15:1053-1058.
– reference: Cowan DD, Lucena CJP. Abstract data views: An interface specification concept to enhance design for reuse. IEEE Transactions on Software Engineering 1995; 21:229-243.
– reference: Booch G, Jacobson I, Rumbaugh J. The Unified Modeling Language User Guide. Addison-Wesley, 1998.
– reference: Gamma E, Helm R, Johnson R, Vlissides J. Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, 1994.
– reference: Cowan DD, Ierusalimschy R, Lucena CJP, Stepien TM. Abstract data views. Structured Programming 1993; 14:1-13.
– reference: Menezes AJ, Oorschot PC, Vantone SA. Handbook of Applied Cryptography. CRC Press: Boca Raton, FL, 1996.
– volume: 15
  start-page: 1053
  year: 1972
  end-page: 1058
  article-title: On the criteria to be used in decomposing systems into modules
  publication-title: Communications of the ACM
– volume: 14
  start-page: 1
  year: 1993
  end-page: 13
  article-title: Abstract data views
  publication-title: Structured Programming
– start-page: 17
  year: 1998
  end-page: 22
– volume: 29
  start-page: 289
  year: 1986
  end-page: 300
  article-title: The design of a capability‐based distributed operating system
  publication-title: The Computer Journal
– volume: 3
  start-page: 143
  issue: 2
  year: 1996
  end-page: 160
  article-title: Roles: Conceptual abstraction theory and practical language issues
  publication-title: Theory and Practice of Object Systems
– start-page: 411
  year: 1993
  end-page: 428
– volume: 21
  start-page: 229
  year: 1995
  end-page: 243
  article-title: Abstract data views: An interface specification concept to enhance design for reuse
  publication-title: IEEE Transactions on Software Engineering
– year: 1997
– year: 2000
– year: 1996
– year: 1995
– volume: 21
  start-page: S120
  issue: 2
  year: 1978
  end-page: 126
  article-title: A method for obtaining digital signatures and public‐key cryptosystems
  publication-title: Communications of the ACM
– volume: 23
  start-page: 255
  year: 1993
  end-page: 275
  article-title: Application integration: Constructing composite applications from interactive components
  publication-title: Software Practice and Experience
– year: 1993
– year: 1994
– year: 1998
– year: 1999
– volume-title: Handbook of Applied Cryptography
  ident: e_1_2_1_26_2
– ident: e_1_2_1_17_2
– ident: e_1_2_1_22_2
– ident: e_1_2_1_10_2
  doi: 10.1145/242224.242413
– ident: e_1_2_1_3_2
– ident: e_1_2_1_19_2
  doi: 10.1002/spe.4380230304
– volume-title: Pattern‐Oriented Software Architecture: A System of Patterns
  ident: e_1_2_1_32_2
– ident: e_1_2_1_5_2
– ident: e_1_2_1_13_2
– ident: e_1_2_1_2_2
– volume-title: Applied Cryptography: Protocol, Algorithms and Source Code in C
  year: 1996
  ident: e_1_2_1_25_2
– ident: e_1_2_1_9_2
– ident: e_1_2_1_30_2
  doi: 10.17487/rfc2246
– ident: e_1_2_1_28_2
– ident: e_1_2_1_8_2
  doi: 10.1002/(SICI)1096-9942(1996)2:3<143::AID-TAPO2>3.0.CO;2-X
– ident: e_1_2_1_4_2
  doi: 10.1145/320384.320420
– volume-title: Understanding Public‐Key Infrastructure: Concepts, Standards, and Deployment Considerations
  year: 1999
  ident: e_1_2_1_23_2
– volume-title: Cryptography and Network Security: Principles and Practice
  ident: e_1_2_1_29_2
– volume-title: Design Patterns: Elements of Reusable Object‐Oriented Software
  year: 1994
  ident: e_1_2_1_21_2
– ident: e_1_2_1_24_2
– ident: e_1_2_1_12_2
  doi: 10.1093/comjnl/29.4.289
– ident: e_1_2_1_16_2
– volume-title: The Unified Modeling Language User Guide
  year: 1998
  ident: e_1_2_1_11_2
– ident: e_1_2_1_27_2
  doi: 10.1145/359340.359342
– ident: e_1_2_1_6_2
  doi: 10.1145/167962.165932
– ident: e_1_2_1_15_2
– ident: e_1_2_1_7_2
  doi: 10.1109/32.372150
– start-page: 17
  volume-title: New Security Paradigms Workshop
  year: 1998
  ident: e_1_2_1_14_2
– ident: e_1_2_1_20_2
  doi: 10.1145/361598.361623
– ident: e_1_2_1_31_2
– volume: 14
  start-page: 1
  year: 1993
  ident: e_1_2_1_18_2
  article-title: Abstract data views
  publication-title: Structured Programming
SSID ssj0011526
Score 1.5826976
Snippet The ‘views’ relationship indicates how an object‐oriented design can be clearly separated into objects and their corresponding interface. This paper uses the...
The 'views' relationship indicates how an object-oriented design can be clearly separated into objects and their corresponding interface. This paper uses the...
The "views" relationship indicates how an object-oriented design can be clearly separated into objects and their corresponding interface. This paper uses the...
SourceID proquest
crossref
wiley
istex
SourceType Aggregation Database
Index Database
Publisher
StartPage 341
SubjectTerms abstract design objects
abstract design views
capability
e-commerce
end-user programming
reuse
security
subject-oriented programming
views
Title Taming access control security: extending capabilities using the views relationship
URI https://api.istex.fr/ark:/67375/WNG-867ZTG2R-Q/fulltext.pdf
https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fspe.440
https://www.proquest.com/docview/27775868
https://www.proquest.com/docview/27777196
Volume 32
WOSCitedRecordID wos000174649500002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVWIB
  databaseName: Wiley Online Library Full Collection 2020
  customDbUrl:
  eissn: 1097-024X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0011526
  issn: 0038-0644
  databaseCode: DRFUL
  dateStart: 19960101
  isFulltext: true
  titleUrlDefault: https://onlinelibrary.wiley.com
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NT8IwFG8MePAifsb52QPxNmFlWzdvRgEPhiAfkXhpuq5VYhyEgfHP97XbEA4aEy_bYW3SvPZ9re_9fghVlQoUr3Nic-XFtkvroFKhE9kyBu-k_IYj_diQTdBOJxiNwu4K1VeGD7H84aY1w9hrreA8SmvfoKHpVF65LmTrZd1SBXlX-a7XGj4srxDAMfkZJmNgg991s45ZPbmWT11zRWUt1c-1OHM1WjXuplX5x0J30HYeY-Kb7FDsog2Z7KFKwd-Ac3XeR_0BfwfPhbkhTcR51TpOc0q7a5z9IddDBPhUU0YLiTXWtfIvGCJHbJBM8awoqHsdTw_QsNUc3N7bOcmCLXT7jh14lLsigMBExVzDEyoRw4NIR8YEwjGlIi6ChvR8Kl3uCx4TDlaBOIo3ROiqxiEqJZNEHiFMPOlzyDelboqiSkZ15YaOcEhEwCzEwkK4kDebZlgaLENNJgyExEBIFro0-7D8zmdvuvSMeuyp02aBT58HbdJjjxa6KDaKgULoWw6eyMkiZYRSyIH84PcRFCyPhapm335aDOt3m_A6_tuwE7RlmGI0DmT9FJXms4U8Q5viYz5OZ-f56fwC8snrSA
linkProvider Wiley-Blackwell
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSwMxEB6kFfTiW6zPHMTbajebTVJvolbFWnxUFC8hzSZaxFpaFX--k-y26kERvOweNoFlkplvJpn5BmDTOel0VdNIuzSLmKiiStXidmQzRCfHk9jyLDSbEM2mvL2tnRdZlb4WJueHGB24ec0I9toruD-Q3vlkDR307DZjGK6XGU-ELEH54LJ-3RjdISAy8ZyUUUYIvCwvmfWTd4qp37Co7MX6_s3R_OquBrypT__nT2dgqvAyyV6-LWZhzHbnYHrYwYEUCj0PVy39hNhFdGibSIq8dTIomtrtkvyM3A8xiKohkRZDa-Kz5e8J-o4kcJmS_jCl7qHTW4Dr-mFr_zgq2ixExhfwRDIVmhmJronLtCcodCbDB7WxzSg6ZM61tZGJTbmwTHOjM6rRLtDY6cTUmEsWodR97tolIDS1XGPEaX1ZlHC2XXWsFpuYtikahsxUgAwFrno5m4bKeZOpQiEpFFIFtsJCjL7r_qNPPhOpumkeKcnFXeuIXqqLCmwMV0qhSvh7Dt21z68DRYXAKIjL30cItD0V2AwL99PPqKvzQ3wt_23YBkwct84aqnHSPF2BydA3xrNCVleh9NJ_tWswbt5eOoP-erFVPwAAou84
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSwMxEB6kFfHiW6zPHIq31W6a3ex6E22rWEptK4qXkOahItbSqvjznWS3VQ-K4GX3sAmESWa-mc3MNwBlaxMrK5IG0kY6YLyCKpWG_cBoRCcbV0MTa99sgrdayc1N2s6zKl0tTMYPMf3h5jTD22un4Gao7eEna-h4aA4Yw3C9yKI0YgUonnbqV83pHQIiU5yRMiYBAi_LSmbd5MN86jcsKjqxvn9zNL-6qx5v6ov_WekSLOReJjnOjsUyzJjBCixOOjiQXKFXoduTT4hdRPq2iSTPWyfjvKndEcn-kbshClHVJ9JiaE1ctvwdQd-ReC5TMpqk1N0_DNfgql7rnZwFeZuFQLkCniCJuGQqQdfEaukICq3S-KAmNJqiQ2ZtX6qkaqKYGyZjJTWVaBdoaGVVpcxW16EweB6YDSA0MrHEiNO4sihuTb9iWRqqkPYpGgatSkAmAhfDjE1DZLzJVKCQBAqpBPt-I6bf5ejRJZ_xSFy3GiKJ-W2vQTvisgR7k50SqBLunkMOzPPrWFDOMQqKk99HcLQ9JSj7jftpMaLbruFr82_D9mCufVoXzfPWxRbM-7YxjhSysg2Fl9Gr2YFZ9fbyMB7t5if1A6Ze7rM
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Taming+access+control+security%3A+extending+capabilities+using+the+views+relationship&rft.jtitle=Software%2C+practice+%26+experience&rft.au=Markiewicz%2C+M+E&rft.au=Lucena%2C+C+J+P&rft.au=Cowan%2C+D+D&rft.date=2002-04-10&rft.issn=0038-0644&rft.volume=32&rft.issue=4&rft.spage=341&rft.epage=358&rft_id=info:doi/10.1002%2Fspe.440&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0038-0644&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0038-0644&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0038-0644&client=summon