August 2003
Intermediate to advanced
496 pages
11h 59m
English
CAS provides a very useful security model, which is quite distinct from, but complementary to, user-based security.[14] Let's look at some of the ways that CAS can be used to solve security problems that are not effectively handled with user-based security techniques alone.
[14] Unlike CAS, user-based security does not seem to be referred to in the literature by an acronym.
CAS provides a flexible security layer over user-based security that allows for varying degrees of trust. This is somewhat similar to the Internet Explorer concept of security zones but is much more configurable and extensible. CAS minimizes the amount of code that must be fully trusted, and it takes into account the fact that trust is not ...
Read now
Unlock full access