O'Reilly logo

J2EE™ Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice by Pankaj Kumar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Technology Stack

Like most technologies, the security technology can be viewed as a stack of technology layers where a higher-level layer depends on or makes use of lower-level layers. Let us begin our recap at the bottom of this stack.

Part 2 of the book explored the Java support for basic cryptographic services framework, service-specific API classes, PKI entities and the associated APIs, tools to handle these entities, access control mechanisms, and transport-layer security with SSL and XML standards for signature and encryption. These abstractions and APIs form the building blocks of the Java platform security and are used in higher-level services.

Cryptographic services fall under two categories: services that represent cryptographic operations ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required