Web Application Access Control with Java SE Security
|
|
- Barnard Martin
- 8 years ago
- Views:
Transcription
1 Web Application Access Control with Java SE Security Java Forum Stuttgart 2009 Jürgen Groothues Stuttgart,
2 Agenda 1. Access Control Basics 2. The Java Authentication and Authorization Service (JAAS) 3. Enhancement and Application of JAAS 4. Role-Based Access Control 5. Instance-Based Access Control 6. Sample Application: A Personal Health Record 2
3 Access Control Basics Action Subject Access Control Resource Environment Subject: A user, system, etc. Resource: A file, printer, domain object, etc. Action: An operation on a resource (read, print, create, etc.) Environment: Access control relevant attributes not available from Subject, Action or Resource (time, location, ) Access Control: Controls performing an Action in accordance with a Policy 3
4 Access Control Architecture 1. Business request PEP 6. Business request Subject 2. Access request 5. Access decision Resource PDP 3. Attributes (optional) 4. Policy Environment PEP: Policy Enforcement Point PDP: Policy Decision Point PAP: Policy Administration Point PAP Policy Store 4
5 Agenda 1. Access Control Basics 2. The Java Authentication and Authorization Service (JAAS) 3. Enhancement and Application of JAAS 4. Role-Based Access Control 5. Instance-Based Access Control 6. Sample Application: A Personal Health Record 5
6 Limitations of JEE Security With the declarative JEE security model, it is difficult to change security policies when new requirements arise The declarative model limits the expressiveness of security policies Only one authentication method per application allowed Supports only limited set of authentication methods 6
7 Java Authentication and Authorization Service (JAAS) Originally, Java SE Authorization was based exclusively on the code accessing resources and authentication was based on digital signatures applied to the code JAAS was designed to address this shortcoming and is part of Java SE since V. 1.4 JAAS authentication is an implementation of the Pluggable Authentication Module (PAM) framework and allows applications to authenticate independently from the underlying technology (user/password, certificate, ) JAAS authorization allows access control based on who is executing the code 7
8 JAAS Authentication API javax.security.auth.login.logincontext login() throws javax.security.auth.login.loginexception JAAS Authentication javax.security.auth.spi.loginmodule JAAS Configuration SPI initialize(subject s, CallbackHandler c, Map sharedstate, Map options); login() throws LoginException; commit() throws LoginException; abort() throws LoginException; logout() throws LoginException; 8
9 JAAS Authorization API java.security.accesscontroller checkpermission(java.security.permission) throws java.security.accesscontrolexception JAAS Authorization java.security.policy implies(java.security.protectiondomain, java.security.permission) SPI Permission: encapsulates access control relevant attributes of Action and Resource AccessControlException: thrown if access to Resource is denied ProtectionDomain: provides Subject 9
10 Agenda 1. Access Control Basics 2. The Java Authentication and Authorization Service (JAAS) 3. Enhancement and Application of JAAS 4. Role-Based Access Control 5. Instance-Based Access Control 6. Sample Application: A Personal Health Record 10
11 Application of JAAS Authentication Servlet Filter Servlet Filter Servlet Filter Servlet Filter FormLogin Filter BasicLogin Filter CertificateLogin Filter PinLogin Filter ServletFilter-driven Enforcement LoginContext JAAS Authentication LoginModule JAAS Configuration DefaultLoginModule User Store Pluggable Authenticator 11
12 Subject and Principals A successful authenticated subject is represented in Java by a javax.security.auth.subject instance A subject is associated with identities. In Java an identity is represented by the java.security.principal interface An application provides Principal implementations javax.security.auth.subject * java.security.principal UserPrincipal RolePrincipal 12
13 Application of JAAS Authorization Subject AccessController Security Annotation Framework (SAF) Resource Annotation-driven Enforcement JAAS Authorization Policy Access Decision Framework Extensible Access Decision 13
14 Security Annotation Framework (SAF) 1 1 Subject Spring AOP AspectJ RT Spring AOP Proxy 2 Method Interceptor CT Enhanced Bytecode 2 AspectJ Advice 4 Domain Object 4 Spring Bean Resource Resource RT Created at runtime SAF Access Manager CT Created at compile time 3 JAAS Adapter 3 14
15 SAF Service Annotations public interface RecordService public Set<Record> findall(); } public Record create (@Secure (SecureAction.CREATE) Record record); 15
16 SAF Domain Object public class Record { private Set<Medication> medications; (SecureAction.UPDATE) public void addmedication(medication medication) { medications.add(medication); }... 16
17 Access Decision Framework 1 java.security. Policy 1 * AccessDecision Voter AccessPolicy AccessDecision Combiner Product Product AccessDecision Combiner Product AccessDecision Voter A Product AccessDecision Voter B use via runtime configuration implements extends use 17
18 Enabling JAAS in a Web Application A JEE-compliant Web Application Server (WAS) is required to support JAAS However, the JEE specification does not require a WAS to use JAAS as its own authentication and authorization mechanism JAAS has to be enabled by the web application itself: Set the JAAS policy during application startup, i.e. call java.security.policy.setpolicy(custompolicy) in the ContextListener Use one (or more) JAAS authentication servlet filter/s Use a JAAS authorization servlet filter that adds a Subject to the JAAS access control context (i.e. call javax.security.auth.subject.doasprivileged( ) request JAAS Authentication Filter request JAAS Authorization Filter request Servlet e.g. FormLoginFilter, PinLoginFilter, etc DoAsPrivilegedFilter 18
19 Agenda 1. Access Control Basics 2. The Java Authentication and Authorization Service (JAAS) 3. Enhancement and Application of JAAS 4. Role-Based Access Control 5. Instance-Based Access Control 6. Sample Application: A Personal Health Record 19
20 Role-Based Access Control (RBAC) P1 P2 P3 Role A Role B Role C P4 JAAS Subject Bob : Role Assignment Bob Principal Bob Permission P4 Pn Permission n Permission Assignment Role A Role B Role C P1 - P2,P3 Effective Permissions for Subject Bob : P1,P2,P3,P4 20
21 Hierarchical Role-Based Access Control (HRBAC) User P1 P4 P2 Physician Professional Pharmacist Non- Professional P3 JAAS Subject Bob : Principal Permission Bob - Physician P4 Professional P2 User P1 Bob Effective Permissions for Subject Bob : P1,P2,P4 Pn Permission n Permission Assignment Parent Role Assignment 21
22 Principal Provider Pattern LoginContext JAAS Authentication LoginModule PrincipalProvider * JAAS Configuration DefaultLoginModule Composite PrincipalProvider Product Role PrincipalProvider Organization PrincipalProvider use via JAAS configuration implements use 22
23 Agenda 1. Access Control Basics 2. The Java Authentication and Authorization Service (JAAS) 3. Enhancement and Application of JAAS 4. Role-Based Access Control 5. Instance-Based Access Control 6. Sample Application: A Personal Health Record 23
24 Instance-Based Access Control (IBAC) Instances of domain objects are secured resources Access decisions are based on the state of the instances :Record owner= Sue :Record owner= Bob :Record owner= Alice :Record owner= Paul :Record owner= No Access on other Records Policy: Bob has access on Records where owner = Alice or Bob Bob 24
25 Annotation-Driven public class Record private String owner; }... The PEP extracts all security relevant attributes from the domain object instance and puts them into a java.security.permission implementation. 25
26 Agenda 1. Access Control Basics 2. The Java Authentication and Authorization Service (JAAS) 3. Enhancement and Application of JAAS 4. Role-Based Access Control 5. Instance-Based Access Control 6. Sample Application: A Personal Health Record 26
27 Sample Application Domain Model Personal Health Record User Management Record owner 1 User * * Medication Observation * Role * Use Cases - Create a new user with roles and an associated new record - Grant access rights to a user - Add medications and observations to a record 27
28 Sample Application Technology Libraries: Testing Build Platform Java SE 6 Spring IOC / AOP / MVC V. 2.5 Security Annotation Framework (SAF) V. 0.9 Servlets V. 2.5 AspectJ V. 1.6 JUnit V. 4.4 EasyMock V.2.4 Maven V. 2.0 Tomcat V
29 Resources Java SE Security Security Annotation Platform (SAF) OASIS extensible Access Control Markup Language (XACML) Enterprise Java Security: Building Secure J2EE Applications by Marco Pistoia et al., Addison Wesley, 2004 Creative Commons Icons 29
30 Contact InterComponentWare AG Jürgen Groothues Industriestraße Walldorf, Germany
Using jlock s Java Authentication and Authorization Service (JAAS) for Application-Level Security
Using jlock s Java Authentication and Authorization Service (JAAS) for Application-Level Security Introduction Updated January 2006 www.2ab.com Access management is a simple concept. Every business has
More informationJAAS Java Authentication and Authorization Services
JAAS Java Authentication and Authorization Services Bruce A Rich Java Security Lead IBM/Tivoli Systems Java is a trademark and Java 2 is a registered trademark of Sun Microsystems Inc. Trademarks Java,
More informationWelcome to Spring Forward 2006. www.springforward2006.com September 26, 2006 Penn State Great Valley
Welcome to Spring Forward 2006 Securing Your Applications with CAS and Acegi Dmitriy Kopylenko Application Developer Architecture & Framework Rutgers University Scott Battaglia Application Developer Enterprise
More informationPassword-based authentication
Lecture topics Authentication and authorization for EJBs Password-based authentication The most popular authentication technology Storing passwords is a problem On the server machines Could encrypt them,
More informationA Pluggable Security Framework for Message Oriented Middleware
A Pluggable Security Framework for Message Oriented Middleware RUEY-SHYANG WU, SHYAN-MING YUAN Department of Computer Science National Chiao-Tung University 1001 Ta Hsueh Road, Hsinchu 300, TAIWAN, R.
More informationWeb Service Authorization Framework
Web Service Authorization Framework Thomas Ziebermayr, Stefan Probst Software Competence Center Hagenberg, Hauptstrasse 99, 4232 Hagenberg, Austria thomas.ziebermayr@scch.at, stefan.probst@scch.at Abstract
More informationAPPLICATION SECURITY ENHANCEMENTS IN JAVA EE 6
APPLICATION SECURITY ENHANCEMENTS IN JAVA EE 6 SRINI PENCHIKALA Austin Java User Group Meeting October 26, 2010 ABOUT THE SPEAKER Security Architect Certified Scrum Master Author, Editor (InfoQ) IASA Austin
More informationOUR COURSES 19 November 2015. All prices are per person in Swedish Krona. Solid Beans AB Kungsgatan 32 411 19 Göteborg Sweden
OUR COURSES 19 November 2015 Solid Beans AB Kungsgatan 32 411 19 Göteborg Sweden Java for beginners JavaEE EJB 3.1 JSF (Java Server Faces) PrimeFaces Spring Core Spring Advanced Maven One day intensive
More informationEnd-to-End Security Policy Auditing and Enforcement in Service Oriented Architecture. Progress Report: January 2014 and Related Research
End-to-End Security Policy Auditing and Enforcement in Service Oriented Architecture Progress Report: January 2014 and Related Research Agenda Motivation REST/SOA Monitoring Framework Demo Future Work
More informationGlassbox: Open Source and Automated Application Troubleshooting. Ron Bodkin Glassbox Project Leader ron.bodkin@glasssbox.com
Glassbox: Open Source and Automated Application Troubleshooting Ron Bodkin Glassbox Project Leader ron.bodkin@glasssbox.com First a summary Glassbox is an open source automated troubleshooter for Java
More informationDeveloping modular Java applications
Developing modular Java applications Julien Dubois France Regional Director SpringSource Julien Dubois France Regional Director, SpringSource Book author :«Spring par la pratique» (Eyrolles, 2006) new
More informationAspect Oriented Programming. with. Spring
Aspect Oriented Programming with Spring Problem area How to modularize concerns that span multiple classes and layers? Examples of cross-cutting concerns: Transaction management Logging Profiling Security
More informationGlassFish Security. open source community experience distilled. security measures. Secure your GlassFish installation, Web applications,
GlassFish Security Secure your GlassFish installation, Web applications, EJB applications, application client module, and Web Services using Java EE and GlassFish security measures Masoud Kalali PUBLISHING
More information<Insert Picture Here> Hudson Security Architecture. Winston Prakash. Click to edit Master subtitle style
Hudson Security Architecture Click to edit Master subtitle style Winston Prakash Hudson Security Architecture Hudson provides a security mechanism which allows Hudson Administrators
More informationJBS-102: Jboss Application Server Administration. Course Length: 4 days
JBS-102: Jboss Application Server Administration Course Length: 4 days Course Description: Course Description: JBoss Application Server Administration focuses on installing, configuring, and tuning the
More informationRunning and Testing Java EE Applications in Embedded Mode with JupEEter Framework
JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 21 No. 1 (2013), pp. 53-69 Running and Testing Java EE Applications in Embedded Mode with JupEEter Framework Marcin Kwapisz 1 1 Technical University of Lodz Faculty
More informationXACML. extensible Access Control Markup Language
XACML extensible Access Control Markup Language Author Coordinator Doutor Diogo Gomes Collaborator Engenheiro Ricardo Azevedo Universidade de Aveiro Instituto de Telecomunicações Portugal Telecom Inovação
More informationCustomizing the Security Architecture
Chapter7.fm Page 113 Wednesday, April 30, 2003 4:29 PM CHAPTER7 Customizing the Security Architecture The office of government is not to confer happiness, but to give men opportunity to work out happiness
More informationA (re)introduction to Spring Security
A (re)introduction to Spring Security Agenda Before Spring Security: Acegi security Introducing Spring Security View layer security What s coming in Spring Security 3 Before Spring Security There was...
More informationRapid Application Development. and Application Generation Tools. Walter Knesel
Rapid Application Development and Application Generation Tools Walter Knesel 5/2014 Java... A place where many, many ideas have been tried and discarded. A current problem is it's success: so many libraries,
More informationContents at a Glance. 1 Introduction 17. 2 Basic Principles of IT Security 23. 3 Authentication and Authorization in
at a Glance 1 Introduction 17 2 Basic Principles of IT Security 23 3 Authentication and Authorization in SAP NetWeaver Application Server Java 53 4 Single Sign-On 151 5 Identity Provisioning 289 6 Secure
More informationA Model for Access Control Management in Distributed Networks
A Model for Access Control Management in Distributed Networks Master of Science Thesis Azadeh Bararsani Supervisor/Examiner: Dr. Johan Montelius Royal Institute of Technology (KTH), Stockholm, Sweden,
More informationProject Software Security: Securing SendMail with JAAS and Polymer
Project Software Security: Securing SendMail with JAAS and Polymer Frank van Vliet frank@pine.nl Diego Ortiz Yepes d.a.ortiz.yepes@student.tue.nl Jornt van der Wiel j.h.v.d.wiel@student.tue.nl Guido Kok
More informationvcommander will use SSL and session-based authentication to secure REST web services.
vcommander REST API Draft Proposal v1.1 1. Client Authentication vcommander will use SSL and session-based authentication to secure REST web services. 1. All REST API calls must take place over HTTPS 2.
More informationSPRING INTERVIEW QUESTIONS
SPRING INTERVIEW QUESTIONS http://www.tutorialspoint.com/spring/spring_interview_questions.htm Copyright tutorialspoint.com Dear readers, these Spring Interview Questions have been designed specially to
More informationResearch Article. ISSN 2347-9523 (Print) *Corresponding author Lili Wang Email: lily@nepu.edu.cn
Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2015; 3(4B):424-428 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)
More informationProgramma corso di formazione J2EE
Programma corso di formazione J2EE Parte 1 Web Standard Introduction to Web Application Technologies Describe web applications Describe Java Platform, Enterprise Edition 5 (Java EE 5) Describe Java servlet
More informationgoberlin a Trusted Cloud Marketplace for Governmental and Commercial Services
goberlin a Trusted Cloud Marketplace for Governmental and Commercial Services Data Protection and Security Considerations in an egovernment Cloud in Germany Dr. Klaus-Peter Eckert Public Sector Cloud Forum
More informationSCUR203 Why Do We Need Security Standards?
SCUR203 Why Do We Need Security Standards? Cristina Buchholz Product Security, SAP Learning Objectives As a result of this workshop, you will be able to: Recognize the need for standardization Understand
More informationADMINISTERING ADOBE LIVECYCLE MOSAIC 9.5
ADMINISTERING ADOBE LIVECYCLE MOSAIC 9.5 Legal notices Copyright 2011 Adobe Systems Incorporated and its licensors. All rights reserved. Administering Adobe LiveCycle Mosaic 9.5 March 31, 2011 This administering
More informationHow To Understand The Architecture Of Java 2Ee, J2Ee, And J2E (Java) In A Wordpress Blog Post
Understanding Architecture and Framework of J2EE using Web Application Devadrita Dey Sarkar,Anavi jaiswal, Ankur Saxena Amity University,UTTAR PRADESH Sector-125, Noida, UP-201303, India Abstract: This
More informationCase Studies of Running the Platform. NetBeans UML Servlet JSP GlassFish EJB
September Case Studies of Running the Platform NetBeans UML Servlet JSP GlassFish EJB In this project we display in the browser the Hello World, Everyone! message created in the session bean with servlets
More informationenterprise^ IBM WebSphere Application Server v7.0 Security "publishing Secure your WebSphere applications with Java EE and JAAS security standards
IBM WebSphere Application Server v7.0 Security Secure your WebSphere applications with Java EE and JAAS security standards Omar Siliceo "publishing enterprise^ birmingham - mumbai Preface 1 Chapter 1:
More informationWhite Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution
White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations
More informationThis presentation will provide a brief introduction to Rational Application Developer V7.5.
This presentation will provide a brief introduction to Rational Application Developer V7.5. Page 1 of 11 This presentation will first discuss the fundamental software components in this release, followed
More informationOpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
More informationComplete Java Web Development
Complete Java Web Development JAVA-WD Rev 11.14 4 days Description Complete Java Web Development is a crash course in developing cutting edge Web applications using the latest Java EE 6 technologies from
More informationIdentification and Implementation of Authentication and Authorization Patterns in the Spring Security Framework
Identification and Implementation of Authentication and Authorization Patterns in the Spring Security Framework Aleksander Dikanski, Roland Steinegger, Sebastian Abeck Research Group Cooperation & Management
More informationSecurity As A Service Leveraged by Apache Projects. Oliver Wulff, Talend
Security As A Service Leveraged by Apache Projects Oliver Wulff, Talend Application Security Landscape 2 Solution Building blocks Apache CXF Fediz Single Sign On (WS-Federation) Attribute Based Access
More informationKohsuke Kawaguchi Sun Microsystems, Inc. hk2.dev.java.net, glassfish.dev.java.net. Session ID
1 Kohsuke Kawaguchi Sun Microsystems, Inc. hk2.dev.java.net, glassfish.dev.java.net Session ID 2 What s GlassFish v3? JavaEE 6 API for REST (JAX-RS) Better web framework support (Servlet 3.0) WebBeans,
More informationOn XACML, role-based access control, and health grids
On XACML, role-based access control, and health grids 01 On XACML, role-based access control, and health grids D. Power, M. Slaymaker, E. Politou and A. Simpson On XACML, role-based access control, and
More informationJava Enterprise Security. Stijn Van den Enden s.vandenenden@aca-it.be
Java Enterprise Security Stijn Van den Enden s.vandenenden@aca-it.be Agenda Java EE introduction Web module security EJB module security Runtime configuration Other security aspects Spring Security JBoss
More informationToward Configurable Access Control for. Healthcare Information Systems
Toward Configurable Access Control for Healthcare Information Systems Kung Chen a and Da-Wei Wang b a Department of Computer Science, National Chengchi University b Institute of Information Science, Academia
More informationSpring Security 3. rpafktl Pen source. intruders with this easy to follow practical guide. Secure your web applications against malicious
Spring Security 3 Secure your web applications against malicious intruders with this easy to follow practical guide Peter Mularien rpafktl Pen source cfb II nv.iv I I community experience distilled
More informationUsing weblock s Servlet Filters for Application-Level Security
Using weblock s Servlet Filters for Application-Level Security September 2006 www.2ab.com Introduction Access management is a simple concept. Every business has information that needs to be protected from
More informationSpring Security SAML module
Spring Security SAML module Author: Vladimir Schäfer E-mail: vladimir.schafer@gmail.com Copyright 2009 The package contains the implementation of SAML v2.0 support for Spring Security framework. Following
More informationSpring Security 3. http://www.springsource.com/download/community?project=spring%20security
Spring Security 3 1. Introduction http://www.springsource.com/download/community?project=spring%20security 2. Security Namespace Configuration Web.xml configuration: springsecurityfilterchain
More informationBOF2337 Open Source Identity and Access Management Expert Panel, Part II. 23 September 2013 5:30p Hilton - Golden Gate 6/7/8 San Francisco CA
Open Source Identity and Access Management Expert Panel, Part II 23 September 2013 5:30p Hilton - Golden Gate 6/7/8 San Francisco CA slide 2 Expert Panel Emmanuel Lécharny, Apache Software Foundation Howard
More informationEmpowering Patients and Enabling Providers
Empowering Patients and Enabling Providers WITH HEALTH INFORMATION PRIVACY Terry Callahan - Managing Director Agenda About HIPAAT Provider of consent management and auditing for personal/protected health
More informationRemote Pointcut - A Language Construct for Distributed AOP
Remote Pointcut - A Language Construct for Distributed AOP Muga Nishizawa (Tokyo Tech) Shigeru Chiba (Tokyo Tech) Michiaki Tatsubori (IBM) 1 Pointcut-advice model Joinpoints Program execution is modeled
More informationWhat s new in Spring 3.1?
What s new in Spring 3.1? Arjen Poutsma @poutsma SpringSource - a division of VMware 1 Overview Spring 3.0 Spring 3.1 Release Schedule 2 Spring 3.0 3 Spring 3.0 Themes Java 5+ Spring Expression Language
More informationTest Automation Integration with Test Management QAComplete
Test Automation Integration with Test Management QAComplete This User's Guide walks you through configuring and using your automated tests with QAComplete's Test Management module SmartBear Software Release
More informationWeb Development in Java
Web Development in Java Detailed Course Brochure @All Rights Reserved. Techcanvass, 265, Powai Plaza, Hiranandani Garden, Powai, Mumbai www.techcanvass.com Tel: +91 22 40155175 Mob: 773 877 3108 P a g
More informationMESSAGING SECURITY USING GLASSFISH AND OPEN MESSAGE QUEUE
MESSAGING SECURITY USING GLASSFISH AND OPEN MESSAGE QUEUE OWASP AppSec USA 2011 Conference (@appsecusa / hashtag: #appsecusa) Srini Penchikala (@srinip) 09.23.11 GOALS AND SCOPE Goals: Messaging security
More informationJBoss JEE5 with EJB3.0 on NonStop. JAVA SIG, San Jose
Presentation JBoss JEE5 with EJB3.0 on NonStop JAVA SIG, San Jose Jürgen Depping CommitWork GmbH Agenda Motivation JBoss JEE 5 Proof of concept: Porting OmnivoBase to JBoss JEE5 for NonStop ( with remarks
More informationWebSphere Training Outline
WEBSPHERE TRAINING WebSphere Training Outline WebSphere Platform Overview o WebSphere Product Categories o WebSphere Development, Presentation, Integration and Deployment Tools o WebSphere Application
More informationUNIVERSITY OF ILLINOIS AT CHICAGO University of Illinois Ready
UNIVERSITY OF ILLINOIS AT CHICAGO University of Illinois Ready Kuali Ready & University of Illinois Ready Web-Based System adopted by all three campuses of the University of Illinois system Step by step
More informationJapan Communication India Skill Development Center
Japan Communication India Skill Development Center Java Application System Developer Course Detail Track 2b Java Application Software Developer: Phase1 SQL Overview 70 Introduction Database, DB Server
More information8229 8811-000 Page: 1 2013 Unisys Corporation. All rights reserved.
unisys The Unisys Application Service Broker (ASB) product purchased may contain the following open source and third party components. Each component is listed by name and version, followed by its copyright
More informationSpring @Async. Dragan Juričić, PBZ May 2015
Spring @Async Dragan Juričić, PBZ May 2015 Topics Concept of thread pools Servlet 3 async configuration Task Execution and Scheduling Servlet 3 - asynchronous request processing Benefits and downsides
More informationJapan Communication India Skill Development Center
Japan Communication India Skill Development Center Java Application System Developer Course Detail Track 2a Java Application Software Developer: Phase1 SQL Overview 70 Introduction Database, DB Server
More informationDynamic Access Control Infrastructure for On-demand Provisioned Cloud Services
Dynamic Access Control Infrastructure for On-demand Provisioned Cloud Services Canh Ngo SNE Group, University of Amsterdam OGF-ISOD 33 September 19-21, 2011 Lyon, 2011 Agenda Introduction Scenario Motivation
More informationOracle Identity Analytics Architecture. An Oracle White Paper July 2010
Oracle Identity Analytics Architecture An Oracle White Paper July 2010 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may
More informationSSC - Web development Model-View-Controller for Java web application development
SSC - Web development Model-View-Controller for Java web application development Shan He School for Computational Science University of Birmingham Module 06-19321: SSC Outline Outline of Topics Java Server
More informationGlassFish v3. Building an ex tensible modular Java EE application server. Jerome Dochez and Ludovic Champenois Sun Microsystems, Inc.
GlassFish v3 Building an ex tensible modular Java EE application server Jerome Dochez and Ludovic Champenois Sun Microsystems, Inc. Agenda Java EE 6 and GlassFish V3 Modularity, Runtime Service Based Architecture
More informationJava Building Web Apps with Spring Rob Harrop, Interface21 Ltd.
Java Building Web Apps with Spring Rob Harrop, Interface21 Ltd. Contact me at rharrop@interface21.com About the Speaker VP at Interface21 Core Developer on Spring Founder of Spring Modules JMX 2.0 Expert
More informationEnterprise Application Development In Java with AJAX and ORM
Enterprise Application Development In Java with AJAX and ORM ACCU London March 2010 ACCU Conference April 2010 Paul Grenyer Head of Software Engineering p.grenyer@validus-ivc.co.uk http://paulgrenyer.blogspot.com
More informationA Guide to Migrating Enterprise Applications to Spring
A Guide to Migrating Enterprise Applications to Spring Prepared by: Colin Sampaleanu, Co-Founder, SpringSource October 14, 2008 Copyright 2008, SpringSource. Copying, publishing, or distributing without
More informationMastering Tomcat Development
hep/ Mastering Tomcat Development Ian McFarland Peter Harrison '. \ Wiley Publishing, Inc. ' Part I Chapter 1 Chapter 2 Acknowledgments About the Author Introduction Tomcat Configuration and Management
More informationARM-BASED PERFORMANCE MONITORING FOR THE ECLIPSE PLATFORM
ARM-BASED PERFORMANCE MONITORING FOR THE ECLIPSE PLATFORM Ashish Patel, Lead Eclipse Committer for ARM, IBM Corporation Oliver E. Cole, President, OC Systems, Inc. The Eclipse Test and Performance Tools
More informationReference Documentation
Reference Documentation 1.0.0 RC 1 Copyright (c) 2004 - Ben Alex Table of Contents Preface... iv 1. Security... 1 1.1. Before You Begin... 1 1.2. Introduction... 1 1.2.1. Current Status... 1 1.3. High
More informationCOMPARISON BETWEEN SPRING AND ASP.NET FRAMEWORKS
COMPARISON BETWEEN SPRING AND ASP.NET FRAMEWORKS Preeti Malik (pm2371) Instructor: Prof. Gail Kaiser COMS E6125: Web-enhanced Information Management (Spring 2009) ASP.NET MVC IMPLEMENTATION Offers basic
More informationUsing Federated Identity Management in a Business-Process-Management System Requirements, Architecture, and Implementation
Karlsruhe Reports in Informatics 2011,28 Edited by Karlsruhe Institute of Technology, Faculty of Informatics ISSN 2190-4782 Using Federated Identity Management in a Business-Process-Management System Requirements,
More informationJBoss Enterprise Application Platform 6.2 Security Guide
JBoss Enterprise Application Platform 6.2 Security Guide For Use with Red Hat JBoss Enterprise Application Platform 6 Edition 1 Nidhi Chaudhary Lucas Costi Russell Dickenson Sande Gilda Vikram Goyal Eamon
More informationGENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET
http:// GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET Manisha Dawra 1, Ramdev Singh 2 1 Al-Falah School of Engg. & Tech., Vill-Dhauj, Ballabgarh-Sohna Road, Faridabad, Haryana (INDIA)-121004
More informationOverview of Web Services API
1 CHAPTER The Cisco IP Interoperability and Collaboration System (IPICS) 4.5(x) application programming interface (API) provides a web services-based API that enables the management and control of various
More informationMeta Model Based Integration of Role-Based and Discretionary Access Control Using Path Expressions
Meta Model Based Integration of Role-Based and Discretionary Access Control Using Path Expressions Kathrin Lehmann, Florian Matthes Chair for Software Engineering for Business Information Systems Technische
More informationFUSE-ESB4 An open-source OSGi based platform for EAI and SOA
FUSE-ESB4 An open-source OSGi based platform for EAI and SOA Introduction to FUSE-ESB4 It's a powerful OSGi based multi component container based on ServiceMix4 http://servicemix.apache.org/smx4/index.html
More informationCryptoNET: Security Management Protocols
CryptoNET: Security Management Protocols ABDUL GHAFOOR ABBASI, SEAD MUFTIC CoS, School of Information and Communication Technology Royal Institute of Technology Borgarfjordsgatan 15, SE-164 40, Kista,
More informationJMS 2.0: Support for Multi-tenancy
JMS 2.0: Support for Multi-tenancy About this document This document contains proposals on how multi-tenancy might be supported in JMS 2.0. It reviews the Java EE 7 proposals for resource configuration
More informationA Beginners Guide to Fusion Middleware
A Beginners Guide to Fusion Middleware Hans Forbrich Forbrich Computer Consulting Ltd. Congratulations of Brazil for your OTN Tour! Thank you to our interpreter And Thank You for inviting me A Beginners
More informationArchitecture Rules Enforcement and Governance Using Aspects
Architecture Rules Enforcement and Governance Using Aspects Srini Penchikala SATURN 2009 About the Speaker Enterprise Architect Writer, Speaker, Editor (InfoQ) Detroit Java User Group Leader Working with
More informationOpenSSO: Cross Domain Single Sign On
OpenSSO: Cross Domain Single Sign On Version 0.1 History of versions Version Date Author(s) Changes 0.1 11/30/2006 Dennis Seah Contents Initial Draft. 1 Introduction 1 2 Single Domain Single Sign-On 2
More informationJava in Web 2.0. Alexis Roos Principal Field Technologist, CTO Office OEM SW Sales Sun Microsystems, Inc.
Java in Web 2.0 Alexis Roos Principal Field Technologist, CTO Office OEM SW Sales Sun Microsystems, Inc. 1 Agenda Java overview Technologies supported by Java Platform to create Web 2.0 services Future
More informationIONA Security Platform
IONA Security Platform February 22, 2002 Igor Balabine, PhD IONA Security Architect Copyright IONA Technologies 2001 End 2 Anywhere Agenda IONA Security Platform (isp) architecture Integrating with Enterprise
More informationSAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011
NetWeaver Single Sign-On Product Management NetWeaver Identity Management & Security June 2011 Agenda NetWeaver Single Sign-On: Solution overview Key benefits of single sign-on Solution positioning Identity
More informationIdentity Security Using Authentication and Authorization in Cloud Computing
Identity Security Using Authentication and Authorization in Cloud Computing D.Ranjith #1, J.Srinivasan *2 # Department of Computer Science and Applications, Adhiparasakthi College of Arts and Science,Kalavai,Vellore-632506
More informationGenerating Aspect Code from UML Models
Generating Aspect Code from UML Models Iris Groher Siemens AG, CT SE 2 Otto-Hahn-Ring 6 81739 Munich, Germany Iris.Groher@fh-hagenberg.at Stefan Schulze Siemens AG, CT SE 2 Otto-Hahn-Ring 6 81739 Munich,
More informationAspect-oriented Refactoring of a J2EE Framework for Security and Validation Concerns
Aspect-oriented Refactoring of a J2EE Framework for Security and Validation Concerns CS 586 Aspect-Oriented Software Development Project Group Members : Başak Çakar, Elif Demirli, Şadiye Kaptanoğlu Bilkent
More informationAdvanced OpenEdge REST/Mobile Security
Advanced OpenEdge REST/Mobile Security Securing your OpenEdge Web applications Michael Jacobs August 2013 Legal Disclaimer The contents of these materials are confidential information of Progress Software
More informationSingle Sign On In A CORBA-Based
Single Sign On In A CORBA-Based Based Distributed System Igor Balabine IONA Security Architect Outline A standards-based framework approach to the Enterprise application security Security framework example:
More informationGP Connector (GPC) O. Heinze 1, H. Schmuhl 1, B. Bergh 1
GP Connector (GPC) A tool to enable access for general practitioners to a Standards-based Personal and Electronic Health Record in the Rhine-Neckar Region Oslo, August 2011 O. Heinze 1, H. Schmuhl 1, B.
More informationWeb Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.
Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On
More informationOPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
More informationby Charles Souillard CTO and co-founder, BonitaSoft
C ustom Application Development w i t h Bonita Execution Engine by Charles Souillard CTO and co-founder, BonitaSoft Contents 1. Introduction 2. Understanding object models 3. Using APIs 4. Configuring
More informationXACML and Access Management. A Business Case for Fine-Grained Authorization and Centralized Policy Management
A Business Case for Fine-Grained Authorization and Centralized Policy Management Dissolving Infrastructures A recent Roundtable with CIOs from a dozen multinational companies concurred that Identity &
More informationREST and SOAP Services with Apache CXF
REST and SOAP Services with Apache CXF Andrei Shakirin, Talend ashakirin@talend.com ashakirin.blogspot.com/ Agenda Introduction in Apache CXF New CXF features Project using Apache CXF How CXF community
More informationSpecialized Programme on Web Application Development using Open Source Tools
Specialized Programme on Web Application Development using Open Source Tools Objective: At the end of the course, Students will be able to: Understand various open source tools(programming tools and databases)
More informationInternet of Services. Project Introduction. Prof. Dr. Küpper, S. Göndör, M. Salem, M. Slawik, S. Zickau D. Thatmann, A. Uzun, B. Deva, J.
Internet of Services Project Introduction Prof. Dr. Küpper, S. Göndör, M. Salem, M. Slawik, S. Zickau D. Thatmann, A. Uzun, B. Deva, J. Devandraraj Service-centric Networking Telekom Innovation Laboratories
More informationDas Spring Framework - Einführung in leichtgewichtige J2EE Architektur. Jürgen Höller. Organized by:
Do 3.4 Das Spring Framework - Einführung in leichtgewichtige J2EE Architektur Jürgen Höller Organized by: Lindlaustr. 2c, 53842 Troisdorf, Tel.: +49 (0)2241 2341-100, Fax.: +49 (0)2241 2341-199 www.oopconference.com
More information