O'Reilly logo

J2EE™ Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice by Pankaj Kumar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security Concepts

So far we have talked about security without really getting into what we mean by a secure system or what security attributes are relevant in a given context. Intuitively, one feels that a system is secure when it allows authorized users to perform legitimate operations. However a number of concepts and processes must be understood to define the notion of legitimate uses by authorized users.

Anne, an associate professor with the local college, created an account with an online bookstore, giving her university e-mail address as the account identifier. The account stored her VISA credit card number, name on the card, expiration date, billing address and the address of her apartment as the ship address. A temporary password was ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required