Please use this identifier to cite or link to this item: https://rfos.fon.bg.ac.rs/handle/123456789/677
Full metadata record
DC FieldValueLanguage
dc.creatorSavić, Dušan
dc.creatorSimić, Dejan
dc.creatorVlajić, Siniša
dc.date.accessioned2023-05-12T10:17:15Z-
dc.date.available2023-05-12T10:17:15Z-
dc.date.issued2010
dc.identifier.issn0868-4952
dc.identifier.urihttps://rfos.fon.bg.ac.rs/handle/123456789/677-
dc.description.abstractOne of the major activities in software design is defining software architecture. Before designing software structure and software behavior we have to define its architecture. In this paper we have proposed three-tiered software architecture. This software architecture extends application logic tier with security. We have implemented two important security issues: authentication and authorization processes. These processes are implemented through software patterns. The software patterns have the particular place in the Proposed Software Architecture (PSA). In this paper, we have presented these software patterns and explained why they are important in PSA.en
dc.publisherIOS Press
dc.rightsrestrictedAccess
dc.sourceInformatica
dc.subjectsoftware patternsen
dc.subjectsoftware development processen
dc.subjectsoftware architectureen
dc.subjectauthentication and authorization processesen
dc.titleExtended Software Architecture Based on Security Patternsen
dc.typearticle
dc.rights.licenseARR
dc.citation.epage246
dc.citation.issue2
dc.citation.other21(2): 229-246
dc.citation.rankaM21
dc.citation.spage229
dc.citation.volume21
dc.identifier.rcubconv_3064
dc.identifier.scopus2-s2.0-77954809036
dc.identifier.wos000279506000006
dc.type.versionpublishedVersion
item.cerifentitytypePublications-
item.fulltextNo Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.grantfulltextnone-
item.openairetypearticle-
Appears in Collections:Radovi istraživača / Researchers’ publications
Show simple item record

SCOPUSTM   
Citations

3
checked on Nov 17, 2025

Page view(s)

6
checked on Dec 28, 2025

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.