Chapter 12. The Security subsystem

12.1 Introduction

In the previous chapter, we finished the Administration part of the Security subsystem. In this chapter we will finish the rest of it. As you will see, our work on Administration has given us a very sound basis on which to build the rest of Security. We now know precisely what we mean by an OLASUser and precisely what roles the actors can adopt with respect to OLAS.

It is important to note that the work in this Chapter is about capturing the requirements for the OLAS security system. It might suggest one or more solutions to the problem, but it is not prescriptive. For web applications such as OLAS, security is usually implemented by the technology stack on which the application is developed, ...

Get Generative Analysis: The Power of Generative AI for Object-Oriented Software Engineering with UML now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.