O'Reilly logo

Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management by Ray Lai, Ramesh Nagappan, Christopher Steel

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Java Extensible Security Architecture and APIs

Building end-to-end security of an application mandates a security architecture beyond the application’s underlying runtime platform. Security must be extended at all levels, including users, components, services, and communications. Without any compromise, the application security infrastructure must address the core security requirements of maintaining ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required