< Day Day Up > |
This book draws and expands on material from the following sources: ¢ M. Hondo, N. Nagaratnam, and A. Nadalin. "Securing Web Services," IBM Systems Journal 41, 2, 2002. ¢ L. Koved, A. Nadalin, D. Deal, and T. Lawson. "The evolution of Java security," IBM Systems Journal 37, 3, 1998. ¢ L. Koved, A. Nadalin, N. Nagaratnam, M. Pistoia, and T. Shrader. "The Security Challenges for Enterprise Java in an e-Business Environment," IBM Systems Journal 40, 1, 2001. ¢ A. Nadalin and N. Nagaratnam. "J2EE Security: A WebSphere 4.0 Perspective," IBM DeveloperToolbox Technical Magazine . October 2001. http://www.ibm.com/developerworks. ¢ A. Nadalin, T. Shrader, and B. Rich. "Java Cryptography Part 1: Encryption and Decryption," IBM DeveloperToolbox Technical Magazine . December 1999. http://www.ibm.com/developerworks. ¢ A. Nadalin, T. Shrader, and B. Rich. "Java Cryptography Part II: Key Generation and Management," IBM DeveloperToolbox Technical Magazine . March 2000. http://www.ibm.com/developerworks. ¢ A. Nadalin, T. Shrader, and B. Rich. "Java Cryptography Part III: Implementing Your Own Provider," IBM DeveloperToolbox Technical Magazine . June 2000. http://www.ibm.com/developerworks. ¢ A. Nadalin, T. Shrader, and B. Rich. "Java Cryptography Part IV: JCE Export Considerations," IBM DeveloperToolbox Technical Magazine . September 2000. http://www.ibm.com/developerworks. ¢ M. Pistoia, D. F. Reller, D. Gupta, M. Nagnur, and A. K. Ramani. Java 2 Network Security . (Upper Saddle River, NJ: Prentice-Hall, 1999). ¢ T. Shrader, A. Nadalin, and B. Rich. "When Cryptographic Messages Go Bad," IBM DeveloperToolbox Technical Magazine . June 2000. http://www.ibm.com/developerworks. |
< Day Day Up > |