Anonymous Reader writes “Enterprise-level business applications need rigorous security regulations with varying roles; each role also requires its own set of access control lists. This article explains how you can use Struts, taglibs, and servlet filters to develop a powerful and flexible security model that can be used directly by almost any Web-based application.”
Link: ibm.com/developerworks
Category:
- Security