Security challenges for Enterprise Java']Java in an e-business environment

被引:10
|
作者
Koved, L
Nadalin, A
Nagaratnam, N
Pistoia, M
Shrader, T
机构
[1] Tivoli SecureWay Business Unit, Austin, TX 78759 USA
[2] IBM Corp, Applicat & Integrat Middleware Div, Res Triangle Pk, NC 27709 USA
[3] IBM Corp, Div Res, Thomas J Watson Res Ctr, Yorktown Heights, NY 10598 USA
[4] IBM Corp, Software Grp, Austin, TX 78758 USA
关键词
D O I
10.1147/sj.401.0130
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As e-business matures, companies require enterprise-scalable functionality for their corporate Internet and intranet environments. To support the expansion of their computing boundaries, businesses have embraced Web application servers. These servers support servlets, JavaServer Pages(TM): and Enterprise JavaBeans(TM) technologies, providing simplified development and flexible deployment of Web-based applications. However, securing this malleable model presents a challenge. Successful companies recognize that their security infrastructures need to address the e-business challenge. They are aware of the types of attacks that malevolent entities can launch against their servers and can plan appropriate defenses.
引用
收藏
页码:130 / 152
页数:23
相关论文
共 50 条
  • [21] Measurement Systems of Individual E-business Competency in an E-business Management Environment
    Yoon, Chui Young
    2017 4TH INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS AND INFORMATION PROCESSING TECHNOLOGY (CAIPT), 2017, : 235 - 238
  • [22] Java']Java business integration
    Vinoski, S
    IEEE INTERNET COMPUTING, 2005, 9 (04) : 89 - 91
  • [23] Business uses for Java']Java
    Scotkin, J
    DATAMATION, 1996, 42 (05): : 40 - 41
  • [24] The Security, Privacy, and Solutions of E-Business
    Huang, Hao
    Ma, Yuan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MANAGEMENT AND ENGINEERING (CME 2014), 2014, : 441 - 446
  • [25] The evolution of Java']Java security
    Koved, L
    Nadalin, AJ
    Neal, D
    Lawson, T
    IBM SYSTEMS JOURNAL, 1998, 37 (03) : 349 - 364
  • [26] Relationship of the properties in the e-business security
    Shen Yan-guang
    Si Chun-jing
    PROCEEDINGS OF THE 2007 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING - MANAGEMENT AND ORGANIZATION STUDIES SECTION, 2007, : 1128 - 1131
  • [28] Algorithm aids e-business security
    不详
    IEEE MICRO, 2001, 21 (01) : 7 - 7
  • [29] E-business security: Methodological considerations
    Informatics Research Group, Sheffield Hallam University, Howard Street, S1 1WB, Sheffield, United Kingdom
    World Acad. Sci. Eng. Technol., 2009, (624-631):
  • [30] Security Design for E-Business Applications
    Vasilyevna, Nadejda Belbus
    INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 248 - 251