• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Tim Cooke
  • Campbell Ritchie
  • paul wheaton
  • Ron McLeod
  • Devaka Cooray
Sheriffs:
  • Jeanne Boyarsky
  • Liutauras Vilda
  • Paul Clapham
Saloon Keepers:
  • Tim Holloway
  • Carey Brown
  • Piet Souris
Bartenders:

core security pattern - what security should implement in web application ?

 
Ranch Hand
Posts: 472
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
hi, mr Ramesh Nagappan and Christopher Steel, when we implement a web application , what are the security issues we should concern commonly and what are the technology should come on count first , thank you
 
Author
Posts: 159
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
We always suggest to look security from an end-to-end application security perspective. There are many common issues related to J2EE application security, You may take a look the following URL for details and how to overcome them using security patterns.

http://www.coresecuritypatterns.com/downloads/DEV302_ChessSteelNagappanLai.pdf
[ January 10, 2006: Message edited by: Ramesh Nagappan ]
 
Greenhorn
Posts: 23
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Check out Chapter 9 - Securing the Web Tier- Design Strategies and Best Practices for a list of patterns as well as best practices and pitfalls. You will also want to look at Chapters 10, 11, and 12 if your Web application has a business tier or deals Web Services or Identity Management.
 
Christopher Steel
Greenhorn
Posts: 23
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Check out Chapter 9 - Securing the Web Tier- Design Strategies and Best Practices for a list of patterns as well as best practices and pitfalls. You will also want to look at Chapters 10, 11, and 12 if your Web application has a business tier or deals Web Services or Identity Management.
reply
    Bookmark Topic Watch Topic
  • New Topic