Component Security Design Considerations for J 2 EE and . Net – An Architectural View Part 3 Gunnar

نویسنده

  • Gunnar Peterson
چکیده

Users As an architect designing security implementations, one of the first things to work on is the storage and management of user information. J2EE and .Net allow for a variety of options regarding users. Both support LDAP and RDBMS as user stores while the .Net platform also adds its own Active Directory as a user solution. The architect may view the straightforward integration with Active Directory as a bonus for the .Net platform, since this may make for better reuse. Understanding the existing user stores in your organization and how well they integrate with either platform is important in order to create a manageable system.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Component Security Design Considerations for J 2 EE and . Net – An Architectural View Part 2

Introduction This series of articles aims to provide information regarding key security design elements for developers, architects, security and development team stakeholders who work on component projects. In the previous issue, we discussed design considerations for Sun Microsystems’ middleware platform Java 2 Enterprise Edition (J2EE). In this article we will describe the key issues facing a...

متن کامل

Component Security Design Considerations for J 2 EE and . Net - An Architectural View Part 1 Gunnar

J2EE in brief J2EE is is based on the Java language, but it is different from Java. J2EE requires that Java is used as the programming language (this is a key difference from .Net which allows for many different languages to be used). J2EE itself is much more than just a programming language. J2EE is a standards-based platform which enables developers to solve enterprise problems in an efficien...

متن کامل

Formal approach on modeling and predicting of software system security: Stochastic petri net

To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...

متن کامل

An architectural systems engineering methodology for addressing cyber security

This paper discusses important shortcomings of current approaches to systems security engineering. The value and limitations of perimeter security designs are examined. An architectural approach to systems security engineering is introduced as a complementary means for strengthening current approaches. Accordingly, this paper outlines a methodology to identify classes of new reusable system sec...

متن کامل

Exploring the role of architectural design in creating a sense of security and residential satisfaction in affordable residential complexes for young Iranian low-income families

The most important requirement of the family after food and clothing is housing. It also plays an important role in providing safety and security etc. for the family. Security is important therefore it is placed among other human physiological needs like food, shelter and sanitation. Security feeling is one of the main factorsin stability of urban spaces. It can be said that secure enviro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002