Information security needs to be a part of any application. Solutions range in price from no cost to very expensive. However, quality is usually proportional to cost (but not always). We are going to ...
Role Based Access Control (RBAC) has been around since the 1970s and continues to be a well-accepted industry standard. However, with the arrival of Attribute Based Access Control (ABAC) many companies are shifting their ...
I learned something interesting about about Groovy recently. I was tasked with building a tool for advanced admin users, to provide them an easy way to run batch jobs. It was designed so that users could point ...
Securing an application’s actions by user and role is easy, but what about this fine-grained security? For many applications it’s important to restrict access to specific domain object instances. We could use Spring security ACLs ...