Summary


This chapter explained the Java 2 platform architecture and its security features as they apply to building Java applications. In particular, it described the various Java platforms and the core security features that contribute to the end-to-end security of Java-based applications running on various systemsfrom servers to stand-alone computers, computers to devices, and devices to smart cards. It discussed securing Java applets, JNLP-based Java Web start applications and code obfuscation strategies.

The chapter also described how to use the different security mechanisms, tools, and strategies for implementing the following:

Java application security

Java applet security

Java Web start security

J2ME Platform security

Java Card Platform security

Java code obfuscation

In the next chapter, we will explore the Java extensible security architecture and API mechanisms that allow preserving confidentiality, integrity, authentication, and nonrepudiation in Java-based applications.




Core Security Patterns. Best Practices and Strategies for J2EE, Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net