Changes between Version 2 and Version 3 of RefactoringSecurity


Ignore:
Timestamp:
07/08/06 16:00:01 (13 years ago)
Author:
lawrence
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • RefactoringSecurity

    v2 v3  
    77In particular, from an application developer's point of view, applications should be unaware as to the “state” of the security infrastructure.  This idea is encoded in the following figure: 
    88 
    9 [[Image(source:TI12-security/trunk/architecture/uml/Application.jpg)]] 
     9[[Image(source:TI12-security/trunk/architecture/uml/Application.JPG)]] 
    1010 
    1111Further, we anticipate that the applications we are deploying will be in practice legacy applications, so we want if possible to completely encapsulate the security infrastructure from the applications. This concept is depicted in the inheritance relationship: 
    12 [[Image(TI12-security/trunk/architecture/uml/Legacy Applications.jpg)]] 
     12 
     13[[Image(source:TI12-security/trunk/architecture/uml/LegacyApplications.JPG)]] 
    1314 
    1415