Home > Articles > Programming > Java

  • Print
  • + Share This
This chapter is from the book

References

[Anne2] Anne Anderson. "IEEE Policy 2004 Workshop 8 June 2004—Comparing WSPL and WS-Policy." IEEE Policy 2004.

http://www.policy-workshop.org/2004/slides/Anderson-WSPL_vs_WS-Policy_v2.pdf

[Anne3] Anne Anderson. "An Introduction to the Web Services Policy Language (WSPL)." Sun Microsystems Laboratories, 2004.

http://research.sun.com/projects/xacml/Policy2004.pdf

[BSP] Web Services Interoperability Organization. Basic Security Profile Version 1.0. Working Group Draft. May 15, 2005.

http://www.ws-i.org/Profiles/BasicSecurityProfile-1.0.html

[CoR1] Mark Grand. "Pattern Summaries: Chain of Responsibility."

http://www.developer.com

and

http://www.developer.com/java/other/article.php/631261

[CoR2] data & object factory. "Chain of Responsibility."

http://www.dofactory.com/Patterns/PatternChain.aspx

[CSI] Computer Security Institute. CSI/FBI Computer Crime and Security Survey. Computer Security Institute 2005.

[CSP] Chris Steel, Ramesh Nagappan, Ray Lai. Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management. Boston: Prentice Hall, 2006.

[J2EE14] Bill Shannon. "JavaTM 2 Platform Enterprise Edition Specification, v1.4." Proposed Final Draft 3. Sun Microsystems, April 2003.

http://java.sun.com/j2ee/j2ee-1_4-pfd3-spec.pdf

[J2EE14Tutor] Eric Armstrong, et al. "The J2EE 1.4 Tutorial." Sun Microsystems, 2003.

http://java.sun.com/j2ee/1.4/docs/tutorial/doc/

[JavaVMFlaw] Security Focus. "Security Vulnerability in Sun’s Java Virtual Machine Implementation." Security Focus. October 23, 2003.

http://www.securityfocus.com/archive/1/342147

[LibertyWSFed] Liberty Alliance. "Liberty Alliance & WS-Federation: A Comparative Overview." Liberty Alliance Project White Paper. October 14, 2003.

http://www.projectliberty.org/resources/whitepapers/wsfed-liberty-overview-10-13-03.pdf

[LiGong] Li Gong. "Java Security Architecture." in "Java 2 SDK, Standard Edition Documentation Version 1.4.2." Sun Microsystems, 2003.

http://java.sun.com/j2se/1.4.2/docs/guide/security/spec/securityspec.doc1.html

and

http://java.sun.com/j2se/1.4.2/docs/guide/security/spec/securityspec.doc2.html.

[SGuest] Simon Guest. "WS-Security Interoperability Using WSE 2.0 and Sun JWSDP 1.5." Microsoft, May 2005.

http://msdn.microsoft.com/library/default.asp?url=/library/enus/dnbda/html/wssinteropjwsdp15.asp

[Watkins] Dr. Demien Watkins. "An Overview of Security in the .NET Framework." MSDN Library, January 2002.

http://msdn.microsoft.com/library/default.asp?url=/library/enus/dnnetsec/html/netframesecover.asp

[WindowsAuthFlaw] Microsoft. "MS02-011: An Authentication Flaw Could Allow Unauthorized Users to be Authenticated on the SMTP Service." Article 310669. Revision 7. Microsoft Support, April 13, 2004.

http://support.microsoft.com/default.aspx?scid=kb;EN-US;Q310669

[WSI-countermeasure] Jerry Schwarz, et al., ed. "Security Challenges, Threats and Countermeasures Version 1.0" Final Material. Web Services Interoperability Organization, May 7, 2005.

http://www.ws-i.org/Profiles/BasicSecurity/SecurityChallenges-1.0.pdf

[XACML2] OASIS. eXtensible Access Control Markup Language (XACML) Version 2.0. February 1, 2005.

http://docs.oasis-open.org/xacml/2.0/XACML-2.0-OS-ALL.zip

  • + Share This
  • 🔖 Save To Your Account