Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations
Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations
Enterprise Security with EJB and CORBA
Enterprise Security with EJB and CORBA
Developing Secure Distributed Systems with CORBA
Developing Secure Distributed Systems with CORBA
Authorization Schemes for Large-Scale Systems Based on Java, CORBA and Web Security Models
ICON '99 Proceedings of the 7th IEEE International Conference on Networks
Building Secure Microsoft ASP.NET Applications
Building Secure Microsoft ASP.NET Applications
Security in the Web Services Framework
ISICT '03 Proceedings of the 1st international symposium on Information and communication technologies
Intrusion detection aware component-based systems: A specification-based framework
Journal of Systems and Software
Hi-index | 0.00 |
Enterprise information systems and e-commerce applications are tightly integrated in today's modern enterprises. Component architectures are the base for building such multitier distributed applications. This paper examines the security threats those systems must confront and the solutions proposed by major existing component architectures. A comparative evaluation of both security features and implementation issues is carried out to determine each architecture's strong points and drawbacks.