System News
Three JavaOne Online Technical Sessions Focus on Security
Covers Ajax, JavaServer Faces/Spring/Hibernate and Solaris Trusted Extensions
June 11, 2007,
Volume 112, Issue 2

After attending the session, attendees will have a better understanding of how a typical hacker thinks and will be able to identify the common potential threats and eliminate vulnerabilities, using the mechanisms described in the presentation

Security is the topic for three JavaOneSM Online technical sessions now accessible.

You Are Hacked: Ajax Security Essentials for Enterprise JavaTM Technology Developers

Presented by James Gould and Karthik Shyamsunder, both of VeriSign Inc., this session covers browsers' JavaScriptTM programming language security models and common exploits found in Ajax applications, such as cross-site scripting, cross-site request forgery, malicious data and code injection.

Three Approaches to Securing Your JavaServerTM Faces Technology/Spring/Hibernate Applications

Presented by Jaya Doraiswamy with ELM Resources and Ray Lai with Intuit, this session discusses how different security frameworks can secure the web pages components; the business tier, such as the JavaBeansTM architecture; the data tier such as data objects using Hibernate; and techniques to support both Web and non-Web applications and a variety of security providers, such as JavaTM Authentication and Authorization Service (JAAS), database and LDAP.

Leveraging SolarisTM Trusted Extensions to Implement Platform Security Services for the Java Language

Presented by John Weeks with Sun, he introduces an experimental JavaTM Native Interface (JNITM) implementation of the Trusted Extensions label APIs for use in Java applications. Specifics covered include how these extensions enable Java applications and web services to handle multilevel data and modulate the quality of service when situations arise, and the types of platform-specific services that might be created by using these Java extensions, such as those that use sensitivity labels.

Read More ... [ more...]



Other articles in the Java Technology section of Volume 112, Issue 2:

See all archived articles in the Java Technology section.

Trending in
Vol 234, Issue 2
Trending IT Articles