Chapter 10. Securing the Business TierDesign Strategies and Best Practices


Topics in This Chapter

  • Security Considerations in the Business Tier

  • Business Tier Security Patterns

  • Best Practices and Pitfalls

In Chapter 9, we discussed the security patterns and best practices related to the Web tier. In this chapter, we will examine security patterns and best practices applicable to the Business tier. The Business tier comprises components responsible for implementing the business logic in the application. These patterns build upon those outlined in Core J2EE Patterns [CJP2]. They assume use of certain J2EE patterns and best practices mentioned there as well as industry-recognized approaches.

We will begin by briefly stating prominent security considerations relevant to the Business tier. These security considerations are the driving forces behind the security patterns. We will then dive into a detailed explanation of the security patterns. Finally, we will list some best practices and pitfalls for securing the Business tier.




Core Security Patterns. Best Practices and Strategies for J2EE, Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net