Chapter 11. Security in Patterns for e-business
This chapter discusses the security considerations for end-to-end solutions in the context of the Patterns for e-business.
First a very short introduction to Patterns for e-business is given, describing what patterns are used in what solution development stages. Then, based on the ITSOBank sample application a high level solution design life cycle is presented based on selected patterns. All assumptions and decision drivers have been documented at each design stage.
At the end of the chapter, a final system architecture is proposed as a result of the process.
Get IBM WebSphere V5.0 Security: WebSphere Handbook Series now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.