This series of posts builds upon the mini-series on building a motion-detecting security cam based around the Raspberry Pi. Once you have your motion detecting security cam up and running, you should be able to move on to the next...
Mike Wiesner demoes using Spring Security 3 with its new features, such as expression language-based authorization and extensions, to implement authentication and authorization in Java applications.
So I managed to configure spring security in my last article here but what do I do now. How do I create the login form, login.jsp for my users to authenticate
Question like this one popup on the spring security forum all the time. The question is almost always the same. The system must perform some custom action after...
K. Becker, G. Stumme, R. Wille, U. Wille, and M. Zickwolff. Knowledge Engineering and Knowledge Management Methods, Models, and Tools, volume 1937 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg, (2000)
B. Zhu, J. Yan, Q. Li, C. Yang, J. Liu, N. Xu, M. Yi, and K. Cai. CCS '10: Proceedings of the 17th ACM conference on Computer and communications security, page 187--200. New York, NY, USA, ACM, (October 2010)
V. Srinivasan, J. Stankovic, and K. Whitehouse. UbiComp '08: Proceedings of the 10th international conference on Ubiquitous computing, page 202--211. New York, NY, USA, ACM, (2008)
K. Becker, G. Stumme, R. Wille, U. Wille, and M. Zickwolff. Knowledge Engineering and Knowledge Management. Methods, Models, and Tools., volume 1937 of LNAI, page 352-365. Heidelberg, Springer, (2000)