References


[Sua] Liz Blair. Build to Spec. http://java.sun.com/developer/technicalArticles/J2EE/build/build2.html

[WebAppSecurity] Java Web Services Tutorial. http://java.sun.com/webservices/docs/1.1/tutorial/doc/WebAppSecurity3.html

[Needham] R. M. Needham and M. D. Schroeder. "Using Encryption for Authentication in Large Networks of Computers." Communications of the ACM, Vol. 21 (12), pp. 993-99.

[Kerievsky] Joshua Kerievsky, Refactoring to Patterns. Addison-Wesley, 2004.

[Vau] David Winterfeldt and Ted Husted. Struts in Action, "Chapter 12: Validating User Input." http://java.sun.com/developer/Books/javaprogramming/struts/struts_chptr_12.pdf

[POSA] Buschmann, Meunier, Rohnert, Sommerlad, and Stal. Pattern-Oriented Software ArchitectureA System of Patterns. Wiley Press, 1996-2000.

[Gof] Gamma, Helm, Johnson, Vlissides. Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, 1994.

[EIP] Hohpe, Woolf. Enterprise Integration Patterns. Addison-Wesley, 2004

[CJP2] Alur, Crupi, and Malks. Core J2EE Patterns, Second Edition. Prentice Hall, 2003.

[Java2] The Java™ 2 runtime environment http://java.sun.com/java2

[RFC1508] RFC 1508Generic Security Service Application Program Interface http://www.faqs.org/rfcs/rfc1508.html

[RFC2743] RFC 2743Generic Security Service Application Program Interface Version 2, Update 1 http://www.faqs.org/rfcs/rfc2743.html

[JAAS] Java Authentication and Authorization Service Developer Guide http://java.sun.com/security/jaas/doc/api.html




Core Security Patterns. Best Practices and Strategies for J2EE, Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net