Sunday, July 6, 2008

Practices and Strategies for J2EE, Web Services, and Identity Management

orize users; and fortify Web services, enabling single sign-on, effective identity management, and personal identification using Smart Cards and Biometrics.

Core Security Patterns covers all of the following, and more:
What works and what doesn™t: J2EE application-security best practices, and common pitfalls to avoid
Implementing key Java platform security features in real-world applications
Establishing Web Services security using XML Signature, XML Encryption, WS-Security, XKMS, and WS-I Basic security profile
Designing identity management and service provisioning systems using SAML, Liberty, XACML, and SPML
Designing secure personal identification solutions using Smart Cards and Biometrics
Security design methodology, patterns, best practices, reality checks, defensive strategies, and evaluation checklists
End-to-end security architecture case study: architecting, designing, and implementing an end-to-end security solution for large-scale applications
download

No comments: