<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Adinath%2Craveendraraj</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Adinath%2Craveendraraj"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Adinath,raveendraraj"/>
		<updated>2026-04-05T19:51:36Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Access_Control_Cheat_Sheet&amp;diff=210550</id>
		<title>Access Control Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Access_Control_Cheat_Sheet&amp;diff=210550"/>
				<updated>2016-03-06T07:14:44Z</updated>
		
		<summary type="html">&lt;p&gt;Adinath,raveendraraj: Starting work on fleshing out this section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
This article is focused on providing clear, simple, actionable guidance for providing access control security in your applications. The objective is to provide guidance to developers, reviewers, designers, architects on designing, creating and maintaining access controls in web applications&lt;br /&gt;
&lt;br /&gt;
==What is Access Control / Authorization?==&lt;br /&gt;
&lt;br /&gt;
Authorization is the process where requests to access a particular resource should be granted or denied. It should be noted that authorization is not equivalent to authentication - as these terms and their definitions are frequently confused.  Authentication is providing and validating identity. Authorization includes the execution rules that determines what functionality and data the user (or Principal) may access, ensuring the proper allocation of access rights after authentication is successful.&lt;br /&gt;
&lt;br /&gt;
Web applications need access controls to allow users (with varying privileges) to use the application. They also need administrators to manage the applications access control rules and the granting of permissions or entitlements to users and other entities. Various access control design methodologies are available. To choose the most appropriate one, a risk assessment needs to be performed to identify threats and vulnerabilities specific to your application, so that the proper access control methodology is appropriate for your application.&lt;br /&gt;
&lt;br /&gt;
== Access Control Policy ==&lt;br /&gt;
&lt;br /&gt;
Why do we need an access control policy for web development?&lt;br /&gt;
&lt;br /&gt;
The intention of having an access control policy is to ensure that security requirements are described clearly to architects, designers, developers and support team, such that access control functionality is designed and implemented in a consistent manner.&lt;br /&gt;
&lt;br /&gt;
= Role Based Access Control (RBAC) =&lt;br /&gt;
&lt;br /&gt;
In Role-Based Access Control (RBAC), access decisions are based on an individual's roles and responsibilities within the organization or user base. &lt;br /&gt;
&lt;br /&gt;
The process of defining roles is usually based on analyzing the fundamental goals and structure of an organization and is usually linked to the security policy. For instance, in a medical organization, the different roles of users may include those such as doctor, nurse, attendant, nurse, patients, etc. Obviously, these members require different levels of access in order to perform their functions, but also the types of web transactions and their allowed context vary greatly depending on the security policy and any relevant regulations (HIPAA, Gramm-Leach-Bliley, etc.). &lt;br /&gt;
&lt;br /&gt;
An RBAC access control framework should provide web application security administrators with the ability to determine who can perform what actions, when, from where, in what order, and in some cases under what relational circumstances.  &lt;br /&gt;
&lt;br /&gt;
The advantages of using this methodology are:&lt;br /&gt;
*Roles are assigned based on organizational structure with emphasis on the organizational security policy&lt;br /&gt;
*Easy to use&lt;br /&gt;
*Easy to administer&lt;br /&gt;
*Built into most frameworks&lt;br /&gt;
*Aligns with security principles like segregation of duties and least privileges&lt;br /&gt;
&lt;br /&gt;
Problems that can be encountered while using this methodology:&lt;br /&gt;
*Documentation of the roles and accesses has to be maintained stringently. &lt;br /&gt;
*Multi-tenancy can not be implemented effectively unless there is a way to associate the roles with multi-tenancy capability requirements e.g. OU in Active Directory&lt;br /&gt;
*There is a tendency for scope creep to happen e.g. more accesses and privileges can be given than intended for. Or a user might be included in two roles if proper access reviews and subsequent revocation is not performed.&lt;br /&gt;
*Does not support data based access control&lt;br /&gt;
&lt;br /&gt;
The areas of caution while using RBAC are:&lt;br /&gt;
*Roles must be only be transferred or delegated using strict sign-offs and procedures.&lt;br /&gt;
*When a user changes his role to another one, the administrator must make sure that the earlier access is revoked such that at any given point of time, a user is assigned to only those roles on a need to know basis.&lt;br /&gt;
*Assurance for RBAC must be carried out using strict access control reviews.&lt;br /&gt;
&lt;br /&gt;
= Discretionary Access Control (DAC) =&lt;br /&gt;
&lt;br /&gt;
Discretionary Access Control (DAC) is a means of restricting access to information based on the identity of users and/or membership in certain groups. Access decisions are typically based on the authorizations granted to a user based on the credentials he presented at the time of authentication (user name, password, hardware/software token, etc.). In most typical DAC models, the owner of information or any resource is able to change its permissions at his discretion (thus the name).&lt;br /&gt;
&lt;br /&gt;
A DAC framework can provide web application security administrators with the ability to implement fine grained access control. This model can be a basis for data based access control implementation&lt;br /&gt;
&lt;br /&gt;
The advantages of using this model are:&lt;br /&gt;
*Easy to use&lt;br /&gt;
*Easy to administer&lt;br /&gt;
*Aligns to the principle of least privileges.&lt;br /&gt;
*Object owner has total control over access granted&lt;br /&gt;
&lt;br /&gt;
Problems that can be encountered while using this methodology:&lt;br /&gt;
*Documentation of the roles and accesses has to be maintained stringently.&lt;br /&gt;
*Multi-tenancy can not be implemented effectively unless there is a way to associate the roles with multi-tenancy capability requirements e.g. OU in Active Directory&lt;br /&gt;
*There is a tendency for scope creep to happen e.g. more accesses and privileges can be given than intended for. &lt;br /&gt;
&lt;br /&gt;
The areas of caution while using DAC are:&lt;br /&gt;
*While granting trusts&lt;br /&gt;
&lt;br /&gt;
*Assurance for DAC must be carried out using strict access control reviews.&lt;br /&gt;
&lt;br /&gt;
= Mandatory Access Control (MAC) =&lt;br /&gt;
&lt;br /&gt;
Mandatory Access Control (MAC) ensures that the enforcement of organizational security policy does not rely on voluntary web application user compliance. MAC secures information by assigning sensitivity labels on information and comparing this to the level of sensitivity a user is operating at. MAC is usually appropriate for extremely secure systems including multilevel secure military applications or mission critical data applications. &lt;br /&gt;
&lt;br /&gt;
The advantages of using this methodology are:&lt;br /&gt;
* Access to an object is based on the sensitivity of the object&lt;br /&gt;
* Access based on need to know is strictly adhered to and scope creep has minimal possibility&lt;br /&gt;
* Only an administrator can grant access &lt;br /&gt;
&lt;br /&gt;
Problems that can be encountered while using this methodology:&lt;br /&gt;
* Difficult and expensive to implement&lt;br /&gt;
* Not agile&lt;br /&gt;
&lt;br /&gt;
The areas of caution while using MAC are:&lt;br /&gt;
* Classification and sensitivity assignment at an appropriate and pragmatic level&lt;br /&gt;
* Assurance for MAC must be carried out to ensure that the classification of the objects is at the appropriate level.&lt;br /&gt;
&lt;br /&gt;
= Permission Based Access Control =&lt;br /&gt;
&lt;br /&gt;
The key concept in Permission Based Access Control is the abstraction of application actions into a set of ''permissions''. A ''permission'' may be represented simply as a string based name, for example &amp;quot;READ&amp;quot;. Access decisions are made by checking if the current user ''has'' the permission associated with the requested application action. &lt;br /&gt;
&lt;br /&gt;
The ''has'' relationship between the user and permission may be satisfied by creating a direct relationship between the user and permission (called a ''grant''), or an indirect one. In the indirect model the permission ''grant'' is to an intermediate entity such as ''user group''. A user is considered a member of a ''user group'' if and only if the user ''inherits'' permissions from the ''user group''. The indirect model makes it easier to manage the permissions for a large number of users, since changing the permissions assigned to the user group affects all members of the user group.&lt;br /&gt;
&lt;br /&gt;
In some Permission Based Access Control systems that provide fine-grained domain object level access control, permissions may be grouped into ''classes''. In this model it is assumed that each domain object in the system can be associated with a ''class'' which determines the permissions applicable to the respective domain object. In such a system a &amp;quot;DOCUMENT&amp;quot; class may be defined with the permissions &amp;quot;READ&amp;quot;, &amp;quot;WRITE&amp;quot; and DELETE&amp;quot;; a &amp;quot;SERVER&amp;quot; class may be defined with the permissions &amp;quot;START&amp;quot;, &amp;quot;STOP&amp;quot;, and &amp;quot;REBOOT&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors =&lt;br /&gt;
&lt;br /&gt;
Shruti Kulkarni - shruti.kulkarni [at] owasp.org&amp;lt;br/&amp;gt;&lt;br /&gt;
Mennouchi Islam Azeddine - azeddine.mennouchi [at] owasp.org&amp;lt;br/&amp;gt;&lt;br /&gt;
Jim Manico - jim [at] owasp.org&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Other Cheatsheets =&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Adinath,raveendraraj</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Java_Security_Frameworks&amp;diff=185795</id>
		<title>Java Security Frameworks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Java_Security_Frameworks&amp;diff=185795"/>
				<updated>2014-11-24T03:21:09Z</updated>
		
		<summary type="html">&lt;p&gt;Adinath,raveendraraj: Add OACC to list of security frameworks&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A list of third party (i.e. not part of Java SE or EE) security frameworks. This page contains a list of Java security libraries and frameworks and indicates which security features each library supports. &lt;br /&gt;
&lt;br /&gt;
==Enterprise==&lt;br /&gt;
* [[ESAPI|OWASP Enterprise Security API]] a new OWASP project to provide all essential security services under one roof.&lt;br /&gt;
* [http://www.hdiv.org/ HDIV] A web application security framework that provides a number of functions.&lt;br /&gt;
&lt;br /&gt;
== Access Control (Authentication and Authorization) ==&lt;br /&gt;
* [http://sourceforge.net/projects/jguard jGuard] - jGuard is written in Java. Its goal is to provide a security framework based on JAAS (Java Authentication and Authorization Security). The framework is written for web and standalone applications, to easily provide solutions for access control problems.&lt;br /&gt;
* [http://oaccframework.org/ OACC] - OACC is an application security framework for Java designed for fine grained (object level) access control. OACC uses the abstraction of a ''resource'' for the application objects being secured. This key abstraction enables OACC to provide a rich API that includes grant, revoke and query capabilities for storing and managing the application's security relationships.&lt;br /&gt;
&lt;br /&gt;
== Encryption ==&lt;br /&gt;
* [http://www.bouncycastle.org/ Bouncycastle] - Lightweight Java cryptography APIs&lt;br /&gt;
* [http://www.jasypt.org/ Jasypt] - Jasypt is a java library which allows the developer to add basic encryption capabilities to his/her projects with minimum effort, and without the need of having deep knowledge on how cryptography works.&lt;br /&gt;
&lt;br /&gt;
== Cross Site Scripting (XSS) ==&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Java_Encoder_Project OWASP Java Encoder Project] is a Java 1.5+ simple-to-use drop-in high-performance encoder class with no dependencies to help Java web developers defend against Cross Site Scripting.&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Java_HTML_Sanitizer_Project OWASP Java HTML Sanitizer Project] is a fast and easy to configure HTML Sanitizer written in Java which lets you include HTML authored by third-parties in your web application while protecting against XSS.&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_JSON_Sanitizer OWASP Java JSON Sanitizer] is a tool to convert JSON-like content to valid JSON! The OWASP JSON Sanitizer Project is a simple to use Java library that can be attached at either end of a data-pipeline&lt;br /&gt;
&lt;br /&gt;
== Additional Java Security Libraries  ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;80%&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Name and link&amp;lt;br&amp;gt; &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Updated&amp;lt;br&amp;gt; &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | AU&amp;lt;br&amp;gt; &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | AC&amp;lt;br&amp;gt; &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | CF&amp;lt;br&amp;gt; &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | CR&amp;lt;br&amp;gt; &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | IV&amp;lt;br&amp;gt; &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | OE&amp;lt;br&amp;gt; &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | SM&amp;lt;br&amp;gt; &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | XM&amp;lt;br&amp;gt; &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | XS&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project AntiSami]&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 2011&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;amp;nbsp;Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://santuario.apache.org/ Apache Santuarrio]&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 2011&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;amp;nbsp;Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://shiro.apache.org/ Apache Shiro]&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 2011&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;amp;nbsp;?&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;amp;nbsp;?&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;amp;nbsp;?&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.bouncycastle.org/ Bouncy Castle]&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 2011&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_CSRFGuard_Project CSRFGuard]&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;amp;nbsp;?&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API ESAPI]&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 2010&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;amp;nbsp;?&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;amp;nbsp;?&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.jasypt.org/ Jasypt]&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 2010&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/jguard/ iGuard]&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 2011&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://oaccframework.org/ OACC]&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 2014&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;amp;nbsp;?&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.sapia-oss.org/projects/vlad/ Vlad]&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;amp;nbsp;?&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Security Features Key  ==&lt;br /&gt;
&lt;br /&gt;
*AU Authentication &lt;br /&gt;
*AC Authorization / Access Control &lt;br /&gt;
*CF Anti CSRF &lt;br /&gt;
*CR Cryptography &lt;br /&gt;
*IV Input Validation &lt;br /&gt;
*OE Output encoding &lt;br /&gt;
*SM Session management &lt;br /&gt;
*XM XML security &lt;br /&gt;
*XS XSS protection&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Java_Project]]&lt;/div&gt;</summary>
		<author><name>Adinath,raveendraraj</name></author>	</entry>

	</feed>