l1. Requirement and Solution
l2. Authentication and Authorisation Definitions
l3. Authentication Process
l4. Authentication Example
l5. Authentication Session
l6. More Authentication Session Examples
l7. Authorisation Types
l8. Article On Simple Authorisation
l9. Simple Authorisation in Catalyst
l10. CPAN Lattice-Based Access Control Example
l14. Role Based Access Control
l14.1. Academic Papers
l14.2. Emerging Standards and Implementations
l14.3. Existing Security Implementations
l14.4. Perl Implementations
l14.5. RBAC Design
l14.6. RBAC Example
l15. Further Information