Summary


This chapter has provided some of the basics of securityfrom the fundamentals of cryptography to the challenges in identity management. We have explored the security goals and challenges of securing applications and the different cryptographic mechanisms that are used. We have also discussed other problems that arise from these approaches, such as identity management, single sign-ons, and federated sign-ons.

In the following chapters, we will illustrate how these fundamental requirements are met using Java technologies that provide an end-to-end security architectural foundation. We will also discuss security methodology, patterns, and best practices that contribute to providing secure enterprise computing. We will wrap up by putting all of it together into a set of case studies that demonstrate an end-to-end security architecture using patterns and best practices.




Core Security Patterns. Best Practices and Strategies for J2EE, Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net