© Copyright IBM Corp. 2003. All rights reserved. 185
Chapter 9. Security
As information technology increases in importance, so do the number of threats
directed against this critical infrastructure. A comprehensive security strategy is
essential to protect vital data and to ensure continuity of operations.
An enterprise should be able to deliver a security solution that will protect data
and assets, detect threats and intrusions, and recover from incidents. It should
also be able to provide services to manage the end-to-end security needs.
This chapter discusses the security considerations for end-to-end solutions in the
context of the Patterns for e-business, J2EE messaging applications. The
chapter also includes some of the system management considerations.
The chapter begins with a short introduction to end-to-end security, describing
security principles and concepts.
Using the IV Corp sample application, a high-level security solution design is
presented based on selected patterns.
At the end application security is discussed.
9

Get Self-Service Applications using IBM WebSphere V5.0 and IBM MQSeries Integrator now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.