O'Reilly logo

IT Architectures and Middleware: Strategies for Building Large, Integrated Systems, Second Edition by Peter Bye, Chris Britton

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

10. Security

Security is a hot topic, thanks largely to the Internet. Security is also an enormous subject and growing daily. We can’t do the subject justice in such a small space, so we will concentrate on discussing how to incorporate security concerns into the architecture.

But first, let us ensure that we are using the same terminology. Major security concerns are authentication, access control, protection, and security management.

Authentication is about identifying the users; it is about checking that people are who they say they are. An analogous situation occurs at the front desk in an office block. Before entering beyond the lobby, everyone must either prove his or her identity by showing a pass or register as a visitor at the front ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required