O'Reilly logo

Use Cases: Patterns and Blueprints by Karin Palmkvist, Gunnar Övergaard

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 27. Access Control

Problem

The system is required to include some kind of access security. Access to the information in the system and to the services of the system is stated by the specific access rights given to the individual user.

Characteristics: Common problem. Basic solution.

Keywords: Access rights, checking access rights, data access, information protection, security level, security policy.

Blueprints

Access Control: Embedded Check

Model

Model

Description

The first blueprint model consists of one use case, Manage Access Rights, handling registration and deregistration of access rights. The checking of access rights is in this blueprint mentioned ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required