Comparing the Security Architectures of Sun ONE and Microsoft .NET

Comparing the Security Architectures of Sun ONE and Microsoft .NET

Eduardo B. Fernandez (Florida Atlantic University, USA), Michael Thomsen (Florida Atlantic University, USA) and Minjie H. Fernandez (Florida Atlantic University, USA)
DOI: 10.4018/978-1-59140-186-5.ch009
OnDemand PDF Download:
$37.50

Abstract

Platforms for web services have been reduced to two basic approaches: Microsoft .NET and Sun ONE (J2EE). We compare here these two platforms with respect to the security they provide to the web services that use them. We arrive to the conclusion that although the basic security architectures are fairly similar, their actual implementations differ. Microsoft’s approach appears weaker because of their self-contained approach, and a failure to follow good principles of software and secure systems design.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Acknowledgments
Maria Grazia Fugini, Carlo Bellettini
Chapter 1
Guido Bertoni, Jorge Guajardo, Christof Paar
In the last 20-30 years, the world of modern cryptography has been largely dominated by traditional systems such as the Data Encryption Standard and... Sample PDF
Architectures for Advanced Cryptographic Systems
$37.50
Chapter 2
Diana Berbecaru, Corrado Derenale, Antonio Lioy
The technical solutions and organizational procedures used to manage certificates are collectively named Public Key Infrastructure (PKI). The... Sample PDF
Digital Certificates and Public-Key Infrastructures
$37.50
Chapter 3
Gerald Maradan, Pierre Cotte, Thierry Fornas
Securing data is becoming of the utmost strategic importance in today’s digital environment. Open wide networks such as the Internet and... Sample PDF
Smart Card Applications and Systems: Market Trend and Impact on Other Technological Development
$37.50
Chapter 4
Duminda Wijesekera, Sushil Jajodia
Advances in application areas such as Internet-based transactions, cooperating coalitions, and workflow systems have brought new challenges to... Sample PDF
A Flexible Authorization Framework
$37.50
Chapter 5
Abdelmounaam Rezgui, Athman Rouguettaya, Zaki Malik
Over the past few years there has been a huge influx of web accessible information. Information access and storage methods have grown considerably.... Sample PDF
Enforcing Privacy on the Semantic Web
$37.50
Chapter 6
Secure Data Dissemination  (pages 198-229)
Elisa Berino, Barbara Carminati, Elena Ferrari
In this chapter, we present the main security issues related to the selective dissemination of information (SDI system). More precisely, after... Sample PDF
Secure Data Dissemination
$37.50
Chapter 7
Eduardo Fernandez-Medina, Sabrina De Capitani di Vimercati, Ernesto Damiani, Mario Piattini, Pierangela Samarati
Multimedia content delivery applications are becoming widespread thanks to increasingly cheaper access to high bandwidth networks. Also, the... Sample PDF
Multimedia Security and Digital Rights Management Technology
$37.50
Chapter 8
Ping Lin, K. Selçuk Candan
The cost of creating and maintaining software and hardware infrastructures for delivering web services led to a notable trend toward the use of... Sample PDF
Data and Application Secutiry for Distributed Application Hosting Services
$37.50
Chapter 9
Eduardo B. Fernandez, Michael Thomsen, Minjie H. Fernandez
Platforms for web services have been reduced to two basic approaches: Microsoft .NET and Sun ONE (J2EE). We compare here these two platforms with... Sample PDF
Comparing the Security Architectures of Sun ONE and Microsoft .NET
$37.50
About the Authors