Skip to main content

Application Server Security

  • Chapter
  • First Online:
Sichere Systeme

Part of the book series: Xpert.press ((XPERT.PRESS))

  • 2978 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 19.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. A. Blüher, SAP VM Container, Seminar System Modellierung 2005, Hasso-Plattner-Institute for Software Systems Engineering, http://wendtstud1.hpi.uni-potsdam.de/sysmod-seminar/SS2005/elaborations/04-SAP_VM_Container.pdf

    Google Scholar 

  2. K. Botzum, V. Jessani, S. Barghouti, IBM WebSphere Developer Technical Journal: Database identity propagation in WebSphere Application Server V6, http://www.ibm.com/developerworks/websphere/techjournal/0506_barghouthi/ 0506_barghouthi.html

    Google Scholar 

  3. K. Botzum,. B. Hines, P. Ilechko et al., Advanced authentication in WebSphere Application Server, http://www-128.ibm.com/developerworks/websphere/ techjournal/0508_benantar/0508_benantar.html

    Google Scholar 

  4. K. Botzum, WebSphere Application Server V6 advanced security hardening – Part 1 and 2, http://www-128.ibm.com/developerworks/websphere/techjournal/ 0512_botzum/0512_botzum1.html

    Google Scholar 

  5. A. Chugh, J. Mountjoy, Weblogic. The definitive Guide. Kapitel 17 “Java and Security” über Authentisierung in Weblogic erhältlich unter http://www.onjava.com/pub/a/onjava/excerpt/weblogic_chap17/index.html

    Google Scholar 

  6. D. Cruz, .NET Full Trust, http://www.owasp.org/index.php/.Net_Full_Trust

    Google Scholar 

  7. D. Flanagan, Java Examples in a Nutshell, Source Code unter http://examples.oreilly.com/jenut3/

    Google Scholar 

  8. Sicherheitslücke in SquirrelMail, http://www.heise.de/newsticker/meldung/76736

    Google Scholar 

  9. R. Monzillo, Java Authorization Contract for Containers, JSR-115, SUN Microsystems, http://jcp.org/en/jsr/detail?id=115

    Google Scholar 

  10. W. Kriha, R. Schmitz, Internet-Security aus Software Sicht, Springer 2008

    Google Scholar 

  11. N. Kuck et al., SAP VM Container: Using Process Attachable Virtual Machines to Provide Isolation and Scalability for Large Servers, http://bitser.net/isolate-interest/papers/PAVM.pdf

    Google Scholar 

  12. T. Neward, Server Based Java Programming, Manning Publications, 2000

    Google Scholar 

  13. P.H. Oser, ORB Interceptors: A Crucial Missing Feature in the Enterprise JavaBeans Model, http://www.elca.ch/resources/InvokersNeedToBeAddedToJ2EE5_2.pdf

    Google Scholar 

  14. D. Pilipchuk, Using JAAS in Java EE and SOA Environments, http://today.java.net/pub/a/today/2006/09/14/using-jaas-in-ee-and-soa.html

    Google Scholar 

  15. C. Sadtler, F. Albertoni, B. Fagalde, T. Kleinubing, WebSphere Application Server V6.1: Planning and Design, IBM Redbook, 2006

    Google Scholar 

  16. D. Wallach, E. Felten et al., Extensible Security Architectures for Java, ACM SOSP’97, http://www.cs.princeton.edu/sip/pub/sosp97.pdf

    Google Scholar 

  17. WebSphere Application Server for z/OS V5 and J2EE 1.3 Security Handbook (IBM Redbook), http://www.redbooks.ibm.com/abstracts/sg246086.html

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Walter Kriha Prof. Dr. .

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Schmitz, R., Kriha, W. (2009). Application Server Security. In: Sichere Systeme. Xpert.press. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78959-8_7

Download citation

Publish with us

Policies and ethics