11.5 Security Considerations

 <  Day Day Up  >  

Within a J2EE environment, the security server is the primary user of the JCA to validate signatures on transactions and certificates. However, all primary and secondary objects within the J2EE environment can make use of the capabilities of the JCA and the JCE. For example, an enterprise bean could sign data using a java.security.Signature instance or encrypt data using a javax.crypto.Cipher instance. The JCA and JCE play a fundamental role to any Java application that implements secret- or public-key security.

 <  Day Day Up  >  


Enterprise Java Security. Building Secure J2EE Applications
Enterprise Javaв„ў Security: Building Secure J2EEв„ў Applications
ISBN: 0321118898
EAN: 2147483647
Year: 2004
Pages: 164

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net