Advertisement

Data Security

  • Tim Fox
  • John Edward Scott
  • Scott Spendolini

Abstract

The previous chapter dealt with using conditional display and authorization schemes to control which data users can access and modify. However, even when you use both of these methods, users may still be able to gain access to data that they should not be able to view, or even worse, be able to modify or delete that data.

Keywords

Data Security Application Context Policy Function Page Request Security Logic 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Tim Fox, John Edward Scott, and Scott Spendolini 2011

Authors and Affiliations

  • Tim Fox
  • John Edward Scott
  • Scott Spendolini

There are no affiliations available

Personalised recommendations