Chapter 11. Security in Patterns for e-business

This chapter discusses the security considerations for end-to-end solutions in the context of the Patterns for e-business.

First a very short introduction to Patterns for e-business is given, describing what patterns are used in what solution development stages. Then, based on the ITSOBank sample application a high level solution design life cycle is presented based on selected patterns. All assumptions and decision drivers have been documented at each design stage.

At the end of the chapter, a final system architecture is proposed as a result of the process.

Get IBM WebSphere V5.0 Security: WebSphere Handbook Series now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.