This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
B. Alex, Acegi Reference Documentation 1.0, http://www.acegisecurity.org/docbook/acegi.pdf
Spring Security Reference Documentation 2.0x, 2007, http://static. springframework.org/spring-security/site/reference/pdf/springsecurity.pdf
Apache Software Foundation, Struts User Guide, http://struts.apache.org/1.x/userGuide/preface.html
BEA WebLogic, Introduction to WebLogic Security, http://e-docs.bea.com/wls/docs81/secintro/index.html
A. Chakrabati, Grid Computing Security, Springer-Verlag 2007
Globus Toolkit – Core: Developer’s Guide, http://www.globus.org/toolkit/docs/3.2/core/developer/javaprogramming.html
Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective, http://www.globus.org/toolkit/docs/4.0/security/GT4-GSI-Overview.pdf
Gesucht und gefunden: Cisco-Passwörter, http://www.heise.de/security/news/meldung/62491
Gestohlene PwC-Datensätze für Missbrauch von Click&Buy benutzt [Update] http://www.heise.de/newsticker/Gestohlene-PwC-Datensaetze-fuer-Missbrauch-von-Click-Buy-benutzt-Update–/meldung/115621
D. Heringhaus, No More Secrets, Bericht zu den Sicherheitslücken in OBSOC, der T-COM Web-Applikation zur Kundenverwaltung, http://www.ccc.de/t-hack/stn/inhlt/ drartkl.htm
G. Hohpe, Event-Driven Architectures, http://www.eaipatterns.com/docs/EDA.pdf
E. Armstrong et al., The J2EE 1.4 Tutorial, http://java.sun.com/j2ee/1.4/docs/tutorial/doc/
The JBoss 4 Application Server Guide, http://docs.jboss.org/jbossas/jboss4guide/r1/html/index.html
L. Koved, A. Nadalin, N. Nagaratnam, M. Pistoia, Enterprise Java Security: Building Secure J2EE Applications, Addison-Wesley 2004
R. McRee, SELinux, Apache, and Tomcat – A Securely Implemented Web Application Server, http://www.owasp.org/images/0/01/ Secure_Web_App_Server_McRee_OWASP.pdf
G. Mühl, L. Fiege, P. Pietzuch, Distributed Event-Based Systems, Springer Verlag 2006
M. S. Miller, Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control, Dissertation, Johns Hopkins University, Baltimore, available online at http://www.erights.org/talks/thesis/index.html
D. Moore, Use JAAS for Struts, http://www.mooreds.com/jaas.html
Open Grid Forum, The Open Grid Services Architecture, Version 1.0, http://www.ggf.org/documents/GFD.30.pdf
K. Rannenberg, A. Pfitzmann, G. Müller, Sicherheit – insbesondere mehrseitige IT-Sicherheit, http://www.wiiw.de/publikationen/Sicherheitinsbesonderemehrsei.pdf
L. Reith, Concept of data distribution for woldwide distributed services in service-oriented architectures, Diplomarbeit an der HdM 2007
S. Tuecke et al., Internet X.509 Public Key Infrastructure (PKI) – Proxy Certificate Profile, http://www.ietf.org/rfc/rfc3820.txt
V. Welch, Grid Security Infrastructure Message Specification, http://www.ggf.org/documents/GFD.78.pdf
V. Welch, I. Foster, C. Kesselman et al., X.509 Proxy Certificates for Dynamic Delegation, http://www.globus.org/alliance/publications/papers/pki04-welch-proxy-cert-final.pdf
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Schmitz, R., Kriha, W. (2009). Enterprise Security. In: Sichere Systeme. Xpert.press. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78959-8_6
Download citation
DOI: https://doi.org/10.1007/978-3-540-78959-8_6
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-78958-1
Online ISBN: 978-3-540-78959-8
eBook Packages: Computer Science and Engineering (German Language)