“…The models in the combined languages permits to automatically generate access control infrastructures for server-based applications, built from declarative and programmatic access control mechanisms. A UML-based approach is presented in [12], which could be utilized for the n-tier architecture and some special data storage systems solution [9]. The feasible architecture included a client tier in which user services resided, where the client tier was represented by a Web browser or wireless device (thin client), and either Web browser with Java applets or ActiveX components or a Java application (thick client) [13,14].…”