This week's book giveaway is in the OCMJEA forum.
We're giving away four copies of OCM Java EE 6 Enterprise Architect Exam Guide and have Paul Allen & Joseph Bambara on-line!
See this thread for details.
The moose likes Security and the fly likes core security pattern - what security should implement in web application ? Big Moose Saloon
  Search | Java FAQ | Recent Topics | Flagged Topics | Hot Topics | Zero Replies
Register / Login


Win a copy of OCM Java EE 6 Enterprise Architect Exam Guide this week in the OCMJEA forum!
JavaRanch » Java Forums » Engineering » Security
Bookmark "core security pattern - what security should implement in web application ?" Watch "core security pattern - what security should implement in web application ?" New topic
Author

core security pattern - what security should implement in web application ?

Nakata kokuyo
Ranch Hand

Joined: Apr 13, 2005
Posts: 438
hi, mr Ramesh Nagappan and Christopher Steel, when we implement a web application , what are the security issues we should concern commonly and what are the technology should come on count first , thank you
Ramesh Nagappan
Author
Ranch Hand

Joined: May 06, 2003
Posts: 159
We always suggest to look security from an end-to-end application security perspective. There are many common issues related to J2EE application security, You may take a look the following URL for details and how to overcome them using security patterns.

http://www.coresecuritypatterns.com/downloads/DEV302_ChessSteelNagappanLai.pdf
[ January 10, 2006: Message edited by: Ramesh Nagappan ]

Ramesh Nagappan CISSP<br />Co-Author of "Core Security Patterns"<br />nramesh@post.harvard.edu<br /><a href="http://www.coresecuritypatterns.com" target="_blank" rel="nofollow">www.coresecuritypatterns.com</a>
Christopher Steel
Greenhorn

Joined: Jan 10, 2006
Posts: 23
Check out Chapter 9 - Securing the Web Tier- Design Strategies and Best Practices for a list of patterns as well as best practices and pitfalls. You will also want to look at Chapters 10, 11, and 12 if your Web application has a business tier or deals Web Services or Identity Management.
Christopher Steel
Greenhorn

Joined: Jan 10, 2006
Posts: 23
Check out Chapter 9 - Securing the Web Tier- Design Strategies and Best Practices for a list of patterns as well as best practices and pitfalls. You will also want to look at Chapters 10, 11, and 12 if your Web application has a business tier or deals Web Services or Identity Management.
 
 
subject: core security pattern - what security should implement in web application ?