O'Reilly logo

J2EE™ Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice by Pankaj Kumar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Further Reading

In-depth discussion of RMI programming, including security issues concerning downloaded code, can be found in java.rmi: The Remote Method Invocation Guide by Esmond Pitt and Kathleen McNiff. If you are new to RMI, start with the Java Tutorial, available online from http://java.sun.com and consult the above-mentioned book for advanced topics.

An online paper titled A Framework for Smart Proxies and Interceptors in RMI by Nuno Santos et al. and downloadable from http://umn.dl.sourceforge.net/sourceforge/smartrmi/nsantos02rmiproxy.pdf describes a framework based on dynamic references to implement JAAS-based security for distributed applications that rely on RMI. This paper describes the concepts behind the open source framework SmartRMI, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required