Taming access control security: extending capabilities using the views relationship
The ‘views’ relationship indicates how an object‐oriented design can be clearly separated into objects and their corresponding interface. This paper uses the concept of ‘views’ in order to achieve full separation between the application and the security policy in the design and implementation. The r...
Uložené v:
| Vydané v: | Software, practice & experience Ročník 32; číslo 4; s. 341 - 358 |
|---|---|
| Hlavní autori: | , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Chichester, UK
John Wiley & Sons, Ltd
10.04.2002
|
| Predmet: | |
| ISSN: | 0038-0644, 1097-024X |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | The ‘views’ relationship indicates how an object‐oriented design can be clearly separated into objects and their corresponding interface. This paper uses the concept of ‘views’ in order to achieve full separation between the application and the security policy in the design and implementation. The result is achieved by providing a model for capabilities using ‘views’ that is richer than the traditional capability model. In addition, a distributed access control model is shown to be effective through the use of Secure Object Communication Channels (SOCCs) to allow for secure connections at the object level. This security is applicable in the e‐commerce application domain, bringing security directly to the application ion level. Copyright © 2002 John Wiley & Sons, Ltd. |
|---|---|
| AbstractList | The ‘views’ relationship indicates how an object‐oriented design can be clearly separated into objects and their corresponding interface. This paper uses the concept of ‘views’ in order to achieve full separation between the application and the security policy in the design and implementation. The result is achieved by providing a model for capabilities using ‘views’ that is richer than the traditional capability model. In addition, a distributed access control model is shown to be effective through the use of Secure Object Communication Channels (SOCCs) to allow for secure connections at the object level. This security is applicable in the e‐commerce application domain, bringing security directly to the application ion level. Copyright © 2002 John Wiley & Sons, Ltd. The ‘views’ relationship indicates how an object‐oriented design can be clearly separated into objects and their corresponding interface. This paper uses the concept of ‘views’ in order to achieve full separation between the application and the security policy in the design and implementation. The result is achieved by providing a model for capabilities using ‘views’ that is richer than the traditional capability model. In addition, a distributed access control model is shown to be effective through the use of Secure Object Communication Channels (SOCCs) to allow for secure connections at the abstract object level. This security is applicable in the e‐commerce application domain, bringing security directly to the application abstraction level. Copyright © 2002 John Wiley & Sons, Ltd. The 'views' relationship indicates how an object-oriented design can be clearly separated into objects and their corresponding interface. This paper uses the concept of 'views' in order to achieve full separation between the application and the security policy in the design and implementation. The result is achieved by providing a model for capabilities using 'views' that is richer than the traditional capability model. In addition, a distributed access control model is shown to be effective through the use of Secure Object Communication Channels (SOCCs) to allow for secure connections at the abstract object level. This security is applicable in the e-commerce application domain, bringing security directly to the application abstraction level. Copyright copyright 2002 John Wiley & Sons, Ltd. The "views" relationship indicates how an object-oriented design can be clearly separated into objects and their corresponding interface. This paper uses the concept of "views" to achieve full separation between the application and the security policy in the design and implementation. In addition, a distributed access control model is shown to be effective through the use of Secure Object Communication Channels (SOCCs) to provide security during transmission, since the data is encrypted and thus protected from eavesdroppers. The architectures presented in this paper allow any e-commerce or web application to have proper security at the abstract design level. (Original abstract - amended) |
| Author | Markiewicz, Marcus E. Lucena, Carlos J. P. Cowan, Donald D. |
| Author_xml | – sequence: 1 givenname: Marcus E. surname: Markiewicz fullname: Markiewicz, Marcus E. email: mem@acm.org organization: Laboratório de Engenharia de Software (LES), Departamento de Informática, Pontifícia Universidade Católica, Rio de Janeiro 22460, RJ, Brazil – sequence: 2 givenname: Carlos J. P. surname: Lucena fullname: Lucena, Carlos J. P. organization: Laboratório de Engenharia de Software (LES), Departamento de Informática, Pontifícia Universidade Católica, Rio de Janeiro 22460, RJ, Brazil – sequence: 3 givenname: Donald D. surname: Cowan fullname: Cowan, Donald D. organization: Computer Science Department and Computer Systems Group, University of Waterloo, Waterloo, Ontario N2L 3G1, Canada |
| BookMark | eNqN0E1Lw0AQBuBFFGxV_As56UGi-5Xd1JuIVqH41YriZVk3E7uaJnEnUfvvTYl4E5zDDAwPw_AOyXpZlUDILqOHjFJ-hDUcSknXyIDRkY4pl4_rZECpSGOqpNwkQ8RXShlLuBqQ6cwufPkSWecAMXJV2YSqiBBcG3yzPI7gq4EyWxFna_vsC994wKjF1aqZQ_Th4ROjAIVtfFXi3NfbZCO3BcLOz9wi9-dns9OLeHI9vjw9mcROcEbjNNFWulRJkWe2e1PkLusaBwYZTxOW58_WpQISpUFa5WzGrRaUs9wKN5K52CJ7_d06VO8tYGMWHh0UhS2hatFw3RUbqX_BJFVpB_d76EKFGCA3dfALG5aGUbNK13Tpmi7dTh708tMXsPyLmenNWa_jXnts4OtX2_BmlBY6MQ9XY5Mq_TQb8ztzK74Bzg-NYQ |
| Cites_doi | 10.1145/242224.242413 10.1002/spe.4380230304 10.17487/rfc2246 10.1002/(SICI)1096-9942(1996)2:3<143::AID-TAPO2>3.0.CO;2-X 10.1145/320384.320420 10.1093/comjnl/29.4.289 10.1145/359340.359342 10.1145/167962.165932 10.1109/32.372150 10.1145/361598.361623 |
| ContentType | Journal Article |
| Copyright | Copyright © 2002 John Wiley & Sons, Ltd. |
| Copyright_xml | – notice: Copyright © 2002 John Wiley & Sons, Ltd. |
| DBID | BSCLL AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D F28 FR3 |
| DOI | 10.1002/spe.440 |
| DatabaseName | Istex CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering Engineering Research Database |
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering Engineering Research Database |
| DatabaseTitleList | CrossRef Computer and Information Systems Abstracts Technology Research Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1097-024X |
| EndPage | 358 |
| ExternalDocumentID | 10_1002_spe_440 SPE440 ark_67375_WNG_867ZTG2R_Q |
| Genre | article |
| GroupedDBID | -~X .3N .DC .GA .Y3 05W 0R~ 10A 123 1L6 1OB 1OC 31~ 33P 3R3 3SF 3WU 4.4 4ZD 50Y 50Z 51W 51X 52M 52N 52O 52P 52S 52T 52U 52W 52X 5VS 66C 702 7PT 8-0 8-1 8-3 8-4 8-5 85S 8UM 930 9M8 A03 AAESR AAEVG AAHQN AAMMB AAMNL AANHP AANLZ AAONW AASGY AAXRX AAYCA AAZKR ABCQN ABCUV ABEFU ABIJN ABLJU ABUFD ACAHQ ACBWZ ACCZN ACFBH ACGFS ACIWK ACNCT ACPOU ACRPL ACXBN ACXQS ACYXJ ADBBV ADEOM ADIZJ ADKYN ADMGS ADNMO ADOZA ADXAS ADZMN AEFGJ AEIGN AEIMD AENEX AEUYR AEYWJ AFBPY AFFPM AFGKR AFWVQ AFZJQ AGQPQ AGXDD AGYGG AHBTC AIDQK AIDYY AITYG AIURR ALAGY ALMA_UNASSIGNED_HOLDINGS ALVPJ AMBMR AMYDB ASPBG ATUGU AUFTA AVWKF AZBYB AZFZN AZVAB BAFTC BDRZF BFHJK BHBCM BMNLL BNHUX BROTX BRXPI BSCLL BY8 CS3 D-E D-F D0L DCZOG DPXWK DR2 DRFUL DRSTM DU5 EBS EJD F00 F01 F04 FEDTE G-S G.N GNP GODZA H.T H.X HBH HGLYW HHY HVGLF HZ~ IX1 J0M JPC KQQ LATKE LAW LC2 LC3 LEEKS LH4 LITHE LOXES LP6 LP7 LUTES LW6 LYRES MEWTI MK4 MRFUL MRSTM MSFUL MSSTM MXFUL MXSTM N04 N05 N9A NF~ NNB O66 O9- OIG P2P P2W P2X P4D PQQKQ PZZ Q.N Q11 QB0 QRW R.K ROL RX1 RXW S10 SUPJJ TWZ UB1 V2E W8V W99 WBKPD WH7 WIB WIH WIK WOHZO WQJ WXSBR WYISQ WZISG XG1 XPP XV2 YYP ZCA ZY4 ZZTAW ~02 ~IA ~WT AAHHS ABTAH ACCFJ AEEZP AEQDE AEUQT AFPWT AIWBW AJBDE ALUQN RWI WRC WWW AAYXX CITATION O8X 7SC 8FD JQ2 L7M L~C L~D F28 FR3 |
| ID | FETCH-LOGICAL-c3210-857a4c8643fda0243fcd43f2e1ed2851ffbac83e567e4a6cad2a73021fa3c94f3 |
| IEDL.DBID | DRFUL |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000174649500002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0038-0644 |
| IngestDate | Sun Nov 09 10:33:11 EST 2025 Fri Jul 11 10:48:52 EDT 2025 Sat Nov 29 04:02:25 EST 2025 Wed Jan 22 16:32:52 EST 2025 Tue Nov 11 03:32:20 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Language | English |
| License | http://onlinelibrary.wiley.com/termsAndConditions#vor |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c3210-857a4c8643fda0243fcd43f2e1ed2851ffbac83e567e4a6cad2a73021fa3c94f3 |
| Notes | istex:E16F3EE8D19DB27E74096C7F66A0F785A9CC53C4 ark:/67375/WNG-867ZTG2R-Q ArticleID:SPE440 ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
| PQID | 27775868 |
| PQPubID | 23500 |
| PageCount | 18 |
| ParticipantIDs | proquest_miscellaneous_27777196 proquest_miscellaneous_27775868 crossref_primary_10_1002_spe_440 wiley_primary_10_1002_spe_440_SPE440 istex_primary_ark_67375_WNG_867ZTG2R_Q |
| PublicationCentury | 2000 |
| PublicationDate | 10 April 2002 |
| PublicationDateYYYYMMDD | 2002-04-10 |
| PublicationDate_xml | – month: 04 year: 2002 text: 10 April 2002 day: 10 |
| PublicationDecade | 2000 |
| PublicationPlace | Chichester, UK |
| PublicationPlace_xml | – name: Chichester, UK |
| PublicationTitle | Software, practice & experience |
| PublicationTitleAlternate | Softw: Pract. Exper |
| PublicationYear | 2002 |
| Publisher | John Wiley & Sons, Ltd |
| Publisher_xml | – name: John Wiley & Sons, Ltd |
| References | Booch G, Jacobson I, Rumbaugh J. The Unified Modeling Language User Guide. Addison-Wesley, 1998. Parnas D. On the criteria to be used in decomposing systems into modules. Communications of the ACM 1972; 15:1053-1058. Menezes AJ, Oorschot PC, Vantone SA. Handbook of Applied Cryptography. CRC Press: Boca Raton, FL, 1996. Cowan DD, Ierusalimschy R, Lucena CJP, Stepien TM. Abstract data views. Structured Programming 1993; 14:1-13. Buschmann F, Meunier R, Rohnert H, Sommerlad P, Stal M. Pattern-Oriented Software Architecture: A System of Patterns. Addison-Wesley, 1996. Kristensen K, Osterbye BB. Roles: Conceptual abstraction theory and practical language issues. Theory and Practice of Object Systems 1996; 3(2):143-160. Stallings W. Cryptography and Network Security: Principles and Practice (2nd edn). Prentice Hall, 1998. Mullender SJ, Tanenbaum ASThe design of a capability-based distributed operating system. The Computer Journal 1986; 29:289-300. Adams C, Lloyd S. Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations (1st edn). Macmillan, 1999. Rivest RL, Shamir A, Adleman LA. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978; 21(2):S120-126. Cowan DD, Lucena CJP. Abstract data views: An interface specification concept to enhance design for reuse. IEEE Transactions on Software Engineering 1995; 21:229-243. Cowan DD, Stepien TM, Ierusalimschy R, Lucena CJP. Application integration: Constructing composite applications from interactive components. Software Practice and Experience 1993; 23:255-275. Schneider B. Applied Cryptography: Protocol, Algorithms and Source Code in C (2nd edn). Wiley, 1996. Gamma E, Helm R, Johnson R, Vlissides J. Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, 1994. 1993; 14 1993; 23 2000 1978; 21 1995; 21 1998 1997 1996 1986; 29 1995 1994 1993 1996; 3 1999 1972; 15 Menezes AJ (e_1_2_1_26_2) Booch G (e_1_2_1_11_2) 1998 Schneider B (e_1_2_1_25_2) 1996 Gamma E (e_1_2_1_21_2) 1994 e_1_2_1_22_2 e_1_2_1_20_2 e_1_2_1_27_2 e_1_2_1_24_2 e_1_2_1_28_2 Adams C (e_1_2_1_23_2) 1999 Buschmann F (e_1_2_1_32_2) e_1_2_1_6_2 e_1_2_1_30_2 e_1_2_1_7_2 Riechmann T (e_1_2_1_14_2) 1998 e_1_2_1_4_2 e_1_2_1_5_2 e_1_2_1_2_2 e_1_2_1_3_2 e_1_2_1_12_2 e_1_2_1_10_2 e_1_2_1_31_2 e_1_2_1_15_2 Cowan DD (e_1_2_1_18_2) 1993; 14 e_1_2_1_16_2 e_1_2_1_13_2 e_1_2_1_19_2 e_1_2_1_8_2 e_1_2_1_17_2 e_1_2_1_9_2 Stallings W (e_1_2_1_29_2) |
| References_xml | – reference: Kristensen K, Osterbye BB. Roles: Conceptual abstraction theory and practical language issues. Theory and Practice of Object Systems 1996; 3(2):143-160. – reference: Schneider B. Applied Cryptography: Protocol, Algorithms and Source Code in C (2nd edn). Wiley, 1996. – reference: Mullender SJ, Tanenbaum ASThe design of a capability-based distributed operating system. The Computer Journal 1986; 29:289-300. – reference: Adams C, Lloyd S. Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations (1st edn). Macmillan, 1999. – reference: Stallings W. Cryptography and Network Security: Principles and Practice (2nd edn). Prentice Hall, 1998. – reference: Buschmann F, Meunier R, Rohnert H, Sommerlad P, Stal M. Pattern-Oriented Software Architecture: A System of Patterns. Addison-Wesley, 1996. – reference: Rivest RL, Shamir A, Adleman LA. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978; 21(2):S120-126. – reference: Cowan DD, Stepien TM, Ierusalimschy R, Lucena CJP. Application integration: Constructing composite applications from interactive components. Software Practice and Experience 1993; 23:255-275. – reference: Parnas D. On the criteria to be used in decomposing systems into modules. Communications of the ACM 1972; 15:1053-1058. – reference: Cowan DD, Lucena CJP. Abstract data views: An interface specification concept to enhance design for reuse. IEEE Transactions on Software Engineering 1995; 21:229-243. – reference: Booch G, Jacobson I, Rumbaugh J. The Unified Modeling Language User Guide. Addison-Wesley, 1998. – reference: Gamma E, Helm R, Johnson R, Vlissides J. Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, 1994. – reference: Cowan DD, Ierusalimschy R, Lucena CJP, Stepien TM. Abstract data views. Structured Programming 1993; 14:1-13. – reference: Menezes AJ, Oorschot PC, Vantone SA. Handbook of Applied Cryptography. CRC Press: Boca Raton, FL, 1996. – volume: 15 start-page: 1053 year: 1972 end-page: 1058 article-title: On the criteria to be used in decomposing systems into modules publication-title: Communications of the ACM – volume: 14 start-page: 1 year: 1993 end-page: 13 article-title: Abstract data views publication-title: Structured Programming – start-page: 17 year: 1998 end-page: 22 – volume: 29 start-page: 289 year: 1986 end-page: 300 article-title: The design of a capability‐based distributed operating system publication-title: The Computer Journal – volume: 3 start-page: 143 issue: 2 year: 1996 end-page: 160 article-title: Roles: Conceptual abstraction theory and practical language issues publication-title: Theory and Practice of Object Systems – start-page: 411 year: 1993 end-page: 428 – volume: 21 start-page: 229 year: 1995 end-page: 243 article-title: Abstract data views: An interface specification concept to enhance design for reuse publication-title: IEEE Transactions on Software Engineering – year: 1997 – year: 2000 – year: 1996 – year: 1995 – volume: 21 start-page: S120 issue: 2 year: 1978 end-page: 126 article-title: A method for obtaining digital signatures and public‐key cryptosystems publication-title: Communications of the ACM – volume: 23 start-page: 255 year: 1993 end-page: 275 article-title: Application integration: Constructing composite applications from interactive components publication-title: Software Practice and Experience – year: 1993 – year: 1994 – year: 1998 – year: 1999 – volume-title: Handbook of Applied Cryptography ident: e_1_2_1_26_2 – ident: e_1_2_1_17_2 – ident: e_1_2_1_22_2 – ident: e_1_2_1_10_2 doi: 10.1145/242224.242413 – ident: e_1_2_1_3_2 – ident: e_1_2_1_19_2 doi: 10.1002/spe.4380230304 – volume-title: Pattern‐Oriented Software Architecture: A System of Patterns ident: e_1_2_1_32_2 – ident: e_1_2_1_5_2 – ident: e_1_2_1_13_2 – ident: e_1_2_1_2_2 – volume-title: Applied Cryptography: Protocol, Algorithms and Source Code in C year: 1996 ident: e_1_2_1_25_2 – ident: e_1_2_1_9_2 – ident: e_1_2_1_30_2 doi: 10.17487/rfc2246 – ident: e_1_2_1_28_2 – ident: e_1_2_1_8_2 doi: 10.1002/(SICI)1096-9942(1996)2:3<143::AID-TAPO2>3.0.CO;2-X – ident: e_1_2_1_4_2 doi: 10.1145/320384.320420 – volume-title: Understanding Public‐Key Infrastructure: Concepts, Standards, and Deployment Considerations year: 1999 ident: e_1_2_1_23_2 – volume-title: Cryptography and Network Security: Principles and Practice ident: e_1_2_1_29_2 – volume-title: Design Patterns: Elements of Reusable Object‐Oriented Software year: 1994 ident: e_1_2_1_21_2 – ident: e_1_2_1_24_2 – ident: e_1_2_1_12_2 doi: 10.1093/comjnl/29.4.289 – ident: e_1_2_1_16_2 – volume-title: The Unified Modeling Language User Guide year: 1998 ident: e_1_2_1_11_2 – ident: e_1_2_1_27_2 doi: 10.1145/359340.359342 – ident: e_1_2_1_6_2 doi: 10.1145/167962.165932 – ident: e_1_2_1_15_2 – ident: e_1_2_1_7_2 doi: 10.1109/32.372150 – start-page: 17 volume-title: New Security Paradigms Workshop year: 1998 ident: e_1_2_1_14_2 – ident: e_1_2_1_20_2 doi: 10.1145/361598.361623 – ident: e_1_2_1_31_2 – volume: 14 start-page: 1 year: 1993 ident: e_1_2_1_18_2 article-title: Abstract data views publication-title: Structured Programming |
| SSID | ssj0011526 |
| Score | 1.5826976 |
| Snippet | The ‘views’ relationship indicates how an object‐oriented design can be clearly separated into objects and their corresponding interface. This paper uses the... The 'views' relationship indicates how an object-oriented design can be clearly separated into objects and their corresponding interface. This paper uses the... The "views" relationship indicates how an object-oriented design can be clearly separated into objects and their corresponding interface. This paper uses the... |
| SourceID | proquest crossref wiley istex |
| SourceType | Aggregation Database Index Database Publisher |
| StartPage | 341 |
| SubjectTerms | abstract design objects abstract design views capability e-commerce end-user programming reuse security subject-oriented programming views |
| Title | Taming access control security: extending capabilities using the views relationship |
| URI | https://api.istex.fr/ark:/67375/WNG-867ZTG2R-Q/fulltext.pdf https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fspe.440 https://www.proquest.com/docview/27775868 https://www.proquest.com/docview/27777196 |
| Volume | 32 |
| WOSCitedRecordID | wos000174649500002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVWIB databaseName: Wiley Online Library Full Collection 2020 customDbUrl: eissn: 1097-024X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0011526 issn: 0038-0644 databaseCode: DRFUL dateStart: 19960101 isFulltext: true titleUrlDefault: https://onlinelibrary.wiley.com providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NT8IwFG8MePAifsb52QPxNmFlWzdvRgEPhiAfkXhpuq5VYhyEgfHP97XbEA4aEy_bYW3SvPZ9re_9fghVlQoUr3Nic-XFtkvroFKhE9kyBu-k_IYj_diQTdBOJxiNwu4K1VeGD7H84aY1w9hrreA8SmvfoKHpVF65LmTrZd1SBXlX-a7XGj4srxDAMfkZJmNgg991s45ZPbmWT11zRWUt1c-1OHM1WjXuplX5x0J30HYeY-Kb7FDsog2Z7KFKwd-Ac3XeR_0BfwfPhbkhTcR51TpOc0q7a5z9IddDBPhUU0YLiTXWtfIvGCJHbJBM8awoqHsdTw_QsNUc3N7bOcmCLXT7jh14lLsigMBExVzDEyoRw4NIR8YEwjGlIi6ChvR8Kl3uCx4TDlaBOIo3ROiqxiEqJZNEHiFMPOlzyDelboqiSkZ15YaOcEhEwCzEwkK4kDebZlgaLENNJgyExEBIFro0-7D8zmdvuvSMeuyp02aBT58HbdJjjxa6KDaKgULoWw6eyMkiZYRSyIH84PcRFCyPhapm335aDOt3m_A6_tuwE7RlmGI0DmT9FJXms4U8Q5viYz5OZ-f56fwC8snrSA |
| linkProvider | Wiley-Blackwell |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSwMxEB6kFfTiW6zPHMTbajebTVJvolbFWnxUFC8hzSZaxFpaFX--k-y26kERvOweNoFlkplvJpn5BmDTOel0VdNIuzSLmKiiStXidmQzRCfHk9jyLDSbEM2mvL2tnRdZlb4WJueHGB24ec0I9toruD-Q3vlkDR307DZjGK6XGU-ELEH54LJ-3RjdISAy8ZyUUUYIvCwvmfWTd4qp37Co7MX6_s3R_OquBrypT__nT2dgqvAyyV6-LWZhzHbnYHrYwYEUCj0PVy39hNhFdGibSIq8dTIomtrtkvyM3A8xiKohkRZDa-Kz5e8J-o4kcJmS_jCl7qHTW4Dr-mFr_zgq2ixExhfwRDIVmhmJronLtCcodCbDB7WxzSg6ZM61tZGJTbmwTHOjM6rRLtDY6cTUmEsWodR97tolIDS1XGPEaX1ZlHC2XXWsFpuYtikahsxUgAwFrno5m4bKeZOpQiEpFFIFtsJCjL7r_qNPPhOpumkeKcnFXeuIXqqLCmwMV0qhSvh7Dt21z68DRYXAKIjL30cItD0V2AwL99PPqKvzQ3wt_23YBkwct84aqnHSPF2BydA3xrNCVleh9NJ_tWswbt5eOoP-erFVPwAAou84 |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSwMxEB6kFfHiW6zPHIq31W6a3ex6E22rWEptK4qXkOahItbSqvjznWS3VQ-K4GX3sAmESWa-mc3MNwBlaxMrK5IG0kY6YLyCKpWG_cBoRCcbV0MTa99sgrdayc1N2s6zKl0tTMYPMf3h5jTD22un4Gao7eEna-h4aA4Yw3C9yKI0YgUonnbqV83pHQIiU5yRMiYBAi_LSmbd5MN86jcsKjqxvn9zNL-6qx5v6ov_WekSLOReJjnOjsUyzJjBCixOOjiQXKFXoduTT4hdRPq2iSTPWyfjvKndEcn-kbshClHVJ9JiaE1ctvwdQd-ReC5TMpqk1N0_DNfgql7rnZwFeZuFQLkCniCJuGQqQdfEaukICq3S-KAmNJqiQ2ZtX6qkaqKYGyZjJTWVaBdoaGVVpcxW16EweB6YDSA0MrHEiNO4sihuTb9iWRqqkPYpGgatSkAmAhfDjE1DZLzJVKCQBAqpBPt-I6bf5ejRJZ_xSFy3GiKJ-W2vQTvisgR7k50SqBLunkMOzPPrWFDOMQqKk99HcLQ9JSj7jftpMaLbruFr82_D9mCufVoXzfPWxRbM-7YxjhSysg2Fl9Gr2YFZ9fbyMB7t5if1A6Ze7rM |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Taming+access+control+security%3A+extending+capabilities+using+the+views+relationship&rft.jtitle=Software%2C+practice+%26+experience&rft.au=Markiewicz%2C+M+E&rft.au=Lucena%2C+C+J+P&rft.au=Cowan%2C+D+D&rft.date=2002-04-10&rft.issn=0038-0644&rft.volume=32&rft.issue=4&rft.spage=341&rft.epage=358&rft_id=info:doi/10.1002%2Fspe.440&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0038-0644&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0038-0644&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0038-0644&client=summon |