Vijay Pratap Singh

Greenhorn
+ Follow
since Nov 12, 2005
Merit badge: grant badges
For More
Cows and Likes
Cows
Total received
0
In last 30 days
0
Total given
0
Likes
Total received
0
Received in last 30 days
0
Total given
0
Given in last 30 days
0
Forums and Threads
Scavenger Hunt
expand Ranch Hand Scavenger Hunt
expand Greenhorn Scavenger Hunt

Recent posts by Vijay Pratap Singh

Hi Cliff,

Thanks, I am bit confused.

Your suggestion sound more like a Shrink Wrap solution, that would kill the extensibility of the application at both end-points. If I choose to use XML Web services standards that allows Interoperability between these endpoints...what are are standards available that helps enabling High-Assurance and also guarantees Interoperability ?

-V
Hi Cliff,

Could you highlight how high-assurance design relates with the patterns for J2EE, Enterprise Integration and Security. Does it adopts patterns-driven design approach ? If not, what is the implementation strategy for ensuring architectural qualities and risk mitigation.

Thanks

Vijay
Hi Cliff,

I looked at your reply to your posting about the importance of classification and compartmentalization. If so, do you have an implementation strategy for representing data classification and security labelling for Java enterprise applications. Does access control plays a role in these aspects ?

If Security labelling is possible, do you have suggestions or design patterns for how to implement them ?

Thanks

Vijay
[ January 19, 2006: Message edited by: Ilja Preuss ]
Hi Cliff.,

What is your suggestion for achieving H-A when a J2EE application interoperates with Microsoft .NET using SOAP based Web services ? How Security, reliability and other capabilities can be applied ?

Thanks

Vijay
[ January 19, 2006: Message edited by: Ilja Preuss ]
Hi Cliff,

Does your book discuss a high-assurance design for XML Web services ? What are the complexities ? If so, how it can be accomplished ? It would be nice, if you could highlight a H-A design scenario for Web services ? Do you have a case-study how to make it work ?

Thanks

Vijay P.
[ January 19, 2006: Message edited by: Ilja Preuss ]
Have you read this article:

http://developers.sun.com/prodtech/identserver/reference/techart/bioauthentication.html

Also, refer to "Core Security Patterns" book for design and architecture guidance. I think there is a book promotion going on ! Not sure.
18 years ago
Folks,

Has anyone tried out the 'Secure Session Object' pattern example from the core security patterns book ?

I have trouble creating the Java SealedObject with in a servlet and also Stateless EJB using Weblogic 8.1.

Any suggestions.

-Vijay
18 years ago
Folks,

Has anyone tried out the 'Obfuscated Transfer object' and 'Secure Session Object' pattern examples from the core security patterns book ?

I have trouble creating the Java SealedObject with in a Stateless EJB using Weblogic 8.1.

Any suggestions.

-Vijay
Folks,

Has anyone tried out the 'Obfuscated Transfer object' and 'Secure Session Object' pattern examples from the core security patterns book ?

I have trouble creating the Java SealedObject with in a Stateless EJB using Weblogic 8.1.

Any suggestions.

-Vijay
[ January 03, 2006: Message edited by: Vijay Pratap Singh ]
18 years ago

Originally posted by Jeff Richards:
Does anybody have a tag library for enforcing page-level permissions as defined in the Programmatic Authorization Strategy of the Authorization Enforcer pattern? If so, how hard was it to implement? I really like the pattern and the strategy is perfect for what we are doing. I just don't have much experience with tag libraries.




Did you check www.coresecuritypatterns.com/download.htm
[ December 14, 2005: Message edited by: Vijay Pratap Singh ]
18 years ago
JSP
We got this new book in my library, the patterns are similar to Core J2EE patterns with more emphasis on implementing security. The best practices and reality checks for designing security is very appealing. Free chapter and samples are available at coresecuritypatterns.com and securityfocus.com.
18 years ago
Hello,

I have a project for a customer, which requires to use Smartcard based certificate credentials for authentication. I heard Sun J2SE 1.5 supports Java Card credentials, does any one know how to configure them.

Thanks

Vijay
18 years ago