Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
A. Blüher, SAP VM Container, Seminar System Modellierung 2005, Hasso-Plattner-Institute for Software Systems Engineering, http://wendtstud1.hpi.uni-potsdam.de/sysmod-seminar/SS2005/elaborations/04-SAP_VM_Container.pdf
K. Botzum, V. Jessani, S. Barghouti, IBM WebSphere Developer Technical Journal: Database identity propagation in WebSphere Application Server V6, http://www.ibm.com/developerworks/websphere/techjournal/0506_barghouthi/ 0506_barghouthi.html
K. Botzum,. B. Hines, P. Ilechko et al., Advanced authentication in WebSphere Application Server, http://www-128.ibm.com/developerworks/websphere/ techjournal/0508_benantar/0508_benantar.html
K. Botzum, WebSphere Application Server V6 advanced security hardening – Part 1 and 2, http://www-128.ibm.com/developerworks/websphere/techjournal/ 0512_botzum/0512_botzum1.html
A. Chugh, J. Mountjoy, Weblogic. The definitive Guide. Kapitel 17 “Java and Security” über Authentisierung in Weblogic erhältlich unter http://www.onjava.com/pub/a/onjava/excerpt/weblogic_chap17/index.html
D. Cruz, .NET Full Trust, http://www.owasp.org/index.php/.Net_Full_Trust
D. Flanagan, Java Examples in a Nutshell, Source Code unter http://examples.oreilly.com/jenut3/
Sicherheitslücke in SquirrelMail, http://www.heise.de/newsticker/meldung/76736
R. Monzillo, Java Authorization Contract for Containers, JSR-115, SUN Microsystems, http://jcp.org/en/jsr/detail?id=115
W. Kriha, R. Schmitz, Internet-Security aus Software Sicht, Springer 2008
N. Kuck et al., SAP VM Container: Using Process Attachable Virtual Machines to Provide Isolation and Scalability for Large Servers, http://bitser.net/isolate-interest/papers/PAVM.pdf
T. Neward, Server Based Java Programming, Manning Publications, 2000
P.H. Oser, ORB Interceptors: A Crucial Missing Feature in the Enterprise JavaBeans Model, http://www.elca.ch/resources/InvokersNeedToBeAddedToJ2EE5_2.pdf
D. Pilipchuk, Using JAAS in Java EE and SOA Environments, http://today.java.net/pub/a/today/2006/09/14/using-jaas-in-ee-and-soa.html
C. Sadtler, F. Albertoni, B. Fagalde, T. Kleinubing, WebSphere Application Server V6.1: Planning and Design, IBM Redbook, 2006
D. Wallach, E. Felten et al., Extensible Security Architectures for Java, ACM SOSP’97, http://www.cs.princeton.edu/sip/pub/sosp97.pdf
WebSphere Application Server for z/OS V5 and J2EE 1.3 Security Handbook (IBM Redbook), http://www.redbooks.ibm.com/abstracts/sg246086.html
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Schmitz, R., Kriha, W. (2009). Application Server Security. In: Sichere Systeme. Xpert.press. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78959-8_7
Download citation
DOI: https://doi.org/10.1007/978-3-540-78959-8_7
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-78958-1
Online ISBN: 978-3-540-78959-8
eBook Packages: Computer Science and Engineering (German Language)