Table of Contents
IT:AD:Design:Investigations:Security:Authentication
Notes
Resources
IT:AD:Design:Investigations:Security:Authentication
(UP)
IT:AD:Design:Investigations:Security:Authorisation
IT:AD:Architecture/Concerns/Security:Authorisation:Graph Based
IT:AD:Design:Investigations:Security:Authorisation:ABAC
IT:AD:Design:Investigations:Security:Authorisation:ABAC:XACML
IT:AD:Design:Investigations:Security:Authorisation:CAP
IT:AD:Design:Investigations:Security:Authorisation:DAC
IT:AD:Design:Investigations:Security:Authorisation:DAC:Design
IT:AD:Design:Investigations:Security:Authorisation:DAC:Security Descriptors
IT:AD:Design:Investigations:Security:Authorisation:Distributed
IT:AD:Design:Investigations:Security:Authorisation:PBAC
IT:AD:Design:Investigations:Security:Authorisation:PBAC:Design
IT:AD:Design:Investigations:Security:Authorisation:RBAC
IT:AD:Design:Investigations:Security:Authentication
Summary
Notes
Resources
http://www.technologyreview.com/news/429498/to-keep-passwords-safe-from-hackers-just-break/
http://stackoverflow.com/questions/549/the-definitive-guide-to-forms-based-website-authentication