Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Topics in This Chapter
In Chapter 9, we discussed the security patterns and best practices related to the Web tier. In this chapter, we will examine security patterns and best practices applicable to the Business tier. The Business tier comprises components responsible for implementing the business logic in the application. These patterns build upon those outlined in Core J2EE Patterns [CJP2]. They assume use of certain J2EE patterns and best practices mentioned there as well as industry-recognized approaches. We will begin by briefly stating prominent security considerations relevant to the Business tier. These security considerations are the driving forces behind the security patterns. We will then dive into a detailed explanation of the security patterns. Finally, we will list some best practices and pitfalls for securing the Business tier. |
Категории