Add to Favorites    Make Home Page 14376 Online  
 Language Categories  
 Our Services  

Java » Tips and Tutorials » Security » Java 2 Platform and JAAS Authorization Architectures


Search Projects & Source Codes:

Title Java 2 Platform and JAAS Authorization Architectures
Platform n/a
Price Free
Author Visit Author Website
Website Visit Website of - Java 2 Platform and JAAS Authorization Architectures
Category Java » Tips and Tutorials » Security
Hits 662
Description Follow along as Java architect Abhijit Belapurkar leads this detailed, behind-the-scenes introduction to two distinctly different (yet related) models of authorization: the code-centric model of the Java 2 platform security architecture and the user-centric model of the Java Authentication and Authorization Service.


Google Groups Subscribe to SourceCodesWorld - Techies Talk

Free eBook - Interview Questions: Get over 1,000 Interview Questions in an eBook for free when you join JobsAssist. Just click on the button below to join JobsAssist and you will immediately receive the Free eBook with thousands of Interview Questions in an ebook when you join.

Scripts Related to - Java 2 Platform and JAAS Authorization Architectures

Script Name

Encrypt Data within Mobile Apps Tutorial

In this tutorial, you'll employ the open standard Bouncy Castle to encrypt mobile MIDlet applications. The tutorial provides an overview of how to encrypt application-related data in a Java 2 Micro Edition (J2ME) application. It begins with a brief introduction to data encryption, then continues on to introduce the open source obfuscator, ProGuard. The final section in this tutorial compares MIDlet JAR file sizes, with and without obfuscation.

Secure communication between peers: SSL through JSSE

A core requirement of any non-trivial P2P application is secure communication between peers. While the details of the security depend on how the application will be used and on what it will protect, it's often possible to implement strong, general-purpose security using off-the-shelf technology such as SSL. This article demonstrates how to use SSL (via JSSE) in P2P security.

Your guide to weblet security

Weblets are Java programs that run in a browser, using DirectDOM to directly manipulate displayed documents. Like most Web-based programs, weblets pose a threat to system security if they're mishandled. Fortunately, weblets come with built-in security in the form of the Java sandbox. This final installment of a three-part series on DirectDOM and weblet-based development shows you how to use the sandbox to your best advantage. With simple, working examples, this article demonstrates what a weblet can and can't do by default, and also shows you how to get around the constraints of the sandbox when the situation calls for it.

A three-pronged solution for identifying users

The problem of system security starts with discovering the identity of the user on the other end of the communications link. This article discusses three familiar approaches for identifying users, highlights their strengths and weaknesses (alone and in combinations), and provides some examples of each.

Google Search


Source Codes is a part of Vyom Network.

Vyom Network : Web Hosting | Dedicated Server | Free SMS, GRE, GMAT, MBA | Online Exams | Freshers Jobs | Software Downloads | Interview Questions | Jobs, Discussions | Placement Papers | Free eBooks | Free eBooks | Free Business Info | Interview Questions | Free Tutorials | Arabic, French, German | IAS Preparation | Jokes, Songs, Fun | Free Classifieds | Free Recipes | Free Downloads | Bangalore Info | Tech Solutions | Project Outsourcing, Web Hosting | GATE Preparation | MBA Preparation | SAP Info | Software Testing | Google Logo Maker | Freshers Jobs

Sitemap | Privacy Policy | Terms and Conditions
Copyright ©2003-2019, All Rights Reserved.
Page URL:

Download Yahoo Messenger | Placement Papers | Free SMS | C Interview Questions | C++ Interview Questions | Quick2Host Review