Controlling access to resources through use of security objects including
creating a security object in dependence upon user-selected security
control data types, the security object comprising security control data
and at least one security method; receiving a request for access to the
resource; receiving security request data; and determining access to the
resource in dependence upon the security control data and the security
request data. Creating a security object includes storing in the security
object a resource identification for the resource; storing in the
security object an authorization level of access for the resource;
storing in the security object user-selected security control data types;
and storing in the security object security control data for each
user-selected security control data type. Embodiments include deploying
the security object on a security server or on a client device.