Skip to main content

Enterprise Security

  • Chapter
  • First Online:
  • 2998 Accesses

Part of the book series: Xpert.press ((XPERT.PRESS))

This is a preview of subscription content, log in via an institution.

Buying options

eBook
USD   19.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. B. Alex, Acegi Reference Documentation 1.0, http://www.acegisecurity.org/docbook/acegi.pdf

    Google Scholar 

  2. Spring Security Reference Documentation 2.0x, 2007, http://static. springframework.org/spring-security/site/reference/pdf/springsecurity.pdf

    Google Scholar 

  3. Apache Software Foundation, Struts User Guide, http://struts.apache.org/1.x/userGuide/preface.html

    Google Scholar 

  4. BEA WebLogic, Introduction to WebLogic Security, http://e-docs.bea.com/wls/docs81/secintro/index.html

    Google Scholar 

  5. A. Chakrabati, Grid Computing Security, Springer-Verlag 2007

    Google Scholar 

  6. Globus Toolkit – Core: Developer’s Guide, http://www.globus.org/toolkit/docs/3.2/core/developer/javaprogramming.html

    Google Scholar 

  7. Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective, http://www.globus.org/toolkit/docs/4.0/security/GT4-GSI-Overview.pdf

    Google Scholar 

  8. Gesucht und gefunden: Cisco-Passwörter, http://www.heise.de/security/news/meldung/62491

    Google Scholar 

  9. Gestohlene PwC-Datensätze für Missbrauch von Click&Buy benutzt [Update] http://www.heise.de/newsticker/Gestohlene-PwC-Datensaetze-fuer-Missbrauch-von-Click-Buy-benutzt-Update–/meldung/115621

    Google Scholar 

  10. D. Heringhaus, No More Secrets, Bericht zu den Sicherheitslücken in OBSOC, der T-COM Web-Applikation zur Kundenverwaltung, http://www.ccc.de/t-hack/stn/inhlt/ drartkl.htm

    Google Scholar 

  11. G. Hohpe, Event-Driven Architectures, http://www.eaipatterns.com/docs/EDA.pdf

    Google Scholar 

  12. E. Armstrong et al., The J2EE 1.4 Tutorial, http://java.sun.com/j2ee/1.4/docs/tutorial/doc/

    Google Scholar 

  13. The JBoss 4 Application Server Guide, http://docs.jboss.org/jbossas/jboss4guide/r1/html/index.html

    Google Scholar 

  14. L. Koved, A. Nadalin, N. Nagaratnam, M. Pistoia, Enterprise Java Security: Building Secure J2EE Applications, Addison-Wesley 2004

    Google Scholar 

  15. R. McRee, SELinux, Apache, and Tomcat – A Securely Implemented Web Application Server, http://www.owasp.org/images/0/01/ Secure_Web_App_Server_McRee_OWASP.pdf

    Google Scholar 

  16. G. Mühl, L. Fiege, P. Pietzuch, Distributed Event-Based Systems, Springer Verlag 2006

    Google Scholar 

  17. M. S. Miller, Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control, Dissertation, Johns Hopkins University, Baltimore, available online at http://www.erights.org/talks/thesis/index.html

    Google Scholar 

  18. D. Moore, Use JAAS for Struts, http://www.mooreds.com/jaas.html

    Google Scholar 

  19. Open Grid Forum, The Open Grid Services Architecture, Version 1.0, http://www.ggf.org/documents/GFD.30.pdf

    Google Scholar 

  20. K. Rannenberg, A. Pfitzmann, G. Müller, Sicherheit – insbesondere mehrseitige IT-Sicherheit, http://www.wiiw.de/publikationen/Sicherheitinsbesonderemehrsei.pdf

    Google Scholar 

  21. L. Reith, Concept of data distribution for woldwide distributed services in service-oriented architectures, Diplomarbeit an der HdM 2007

    Google Scholar 

  22. S. Tuecke et al., Internet X.509 Public Key Infrastructure (PKI) – Proxy Certificate Profile, http://www.ietf.org/rfc/rfc3820.txt

    Google Scholar 

  23. V. Welch, Grid Security Infrastructure Message Specification, http://www.ggf.org/documents/GFD.78.pdf

    Google Scholar 

  24. V. Welch, I. Foster, C. Kesselman et al., X.509 Proxy Certificates for Dynamic Delegation, http://www.globus.org/alliance/publications/papers/pki04-welch-proxy-cert-final.pdf

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Walter Kriha .

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Schmitz, R., Kriha, W. (2009). Enterprise Security. In: Sichere Systeme. Xpert.press. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78959-8_6

Download citation

Publish with us

Policies and ethics