Return to Article Details An adaptive authentication and authorization model for service-oriented enterprise computing Download Download PDF