Similar Articles |
|
JavaWorld May 2002 Zhong & Lehr |
US Department of Energy signs on to J2EE If you architect many secure Web applications, authentication and authorization are always important concerns. Defining an architecture so that users can sign on to many n-tier Web applications only once---regardless of who built the applications, when they were built, or what kind of OSs and application servers they run on---is always a big challenge. This article presents a single sign-on architecture. |
JavaWorld September 2001 Jian Zhong |
Step into the J2EE architecture and process By reading this article, you will better understand many important J2EE architecture topics, and be able to apply that knowledge to extend and modify this simple methodology to solve your special business problems... |
JavaWorld December 2001 Humphrey Sheil |
To EJB, or not to EJB? Our industry has spawned folklore and rules of thumb to guide us how best to use EJB -- some true, some out of date, and some pure fabrication. When and how to use EJB in your J2EE application, as well as how to know when EJBs are not the right solution for you... |
New Architect January 2003 Amit Asaravala |
A Question of Identity Passport, Liberty, and the single sign-on race |
JavaWorld March 2003 Frank Sommers |
The first taste of Liberty The Liberty Alliance Project specifications provide a single sign-on mechanism for both Websites and Web services. This article explores how Liberty helps federate a user's identities from different service providers and uses that federated network identity to authenticate a user. |
D-Lib June 2006 Teets & Murray |
Metasearch Authentication and Access Management The NISO Metasearch Initiative Task Group on Access Management makes suggestions to institutions in the process of acquiring new electronic resources to control access to their electronic resources and support metasearch. |
Insurance & Technology September 26, 2009 Akhil Tripathi |
CIO: Insurers Must Build Capabilities on the Four Tiers of Architecture CIOs must answer business's needs armed with appreciation of the different levels of enterprise architecture -- business, information, application and technical -- in order to avoid a proliferation of disconnected point solutions. |
PC Magazine September 7, 2004 Robert P. Lipschutz |
A Better Blueprint for Business Service-oriented architecture frees you from binding relationships with high-priced software consultants. |
JavaWorld August 2000 Sanjay Mahapatra |
Programming restrictions on EJB Sanjay provides an overview of the programming restrictions on EJB component code that developers should adhere to and lists the features in Java that you'd be wise to avoid in order to write reliable and portable EJB 1.1 components.. |
JavaWorld October 2000 Siva Visveswaran |
Dive into connection pooling with J2EE Connection pooling is a technique used for sharing server resources among requesting clients. This article focuses on support for connection pooling of both database resources and nondatabase resources in a J2EE environment... |
Wall Street & Technology June 13, 2006 |
Authentication Gets Deeper Deepnet Unified Authentication is a single integrated authentication platform that provisions, manages and verifies all types of authentication, form factors and user credentials that are used for user authentication with Internet services, remote access and enterprise network access. |
Insurance & Technology May 3, 2006 Deena M. Amato-McCoy |
Service-Oriented Change Heterogeneous systems are at the core of many insurance carriers' IT infrastructures. Yet, companies still struggle with how to seamlessly integrate these often disparate systems across their enterprise. Now, a rapidly evolving architectural strategy is quickly changing the landscape. |
JavaWorld September 2002 Musser & Feuer |
All that JAAS JAAS, the Java Authentication and Authorization Service API, provides flexible and scalable mechanisms for securing your client- and server-side Java applications. |
JavaWorld May 2001 Raghavan N. Srinivas |
Java security evolution and concepts, Part 4 This article details the optional, yet important, packages that enhance Java security. Bonus: A working applet to demonstrate this article's concepts. |
JavaWorld February 2002 Todd E. Sundsted |
With Liberty and single sign-on for all An archipelago of disconnected authentication systems fractures your online persona into dozens or even hundreds of fragmentary identities. The Liberty Alliance Project seeks to solve this identity crisis with a single sign-on solution that will federate these independent authentication systems. But, will the benefits outweigh the costs? |
CIO August 27, 2010 Kim S. Nash |
How Cloud Computing and Mobile Devices Are Changing Your Application Strategy Delivering applications on any device - whether desktops or smartphones - and from any location calls for rethinking your enterprise architecture. |
CIO January 15, 2004 Todd Datz |
Service-Oriented Architecture SOAs promise to speed development and decrease integration time and effort -- but only if you implement them correctly. |
Wall Street & Technology January 22, 2008 Penny Crosman |
Buy Side Firms Start Taking Enterprise Architectures Live Asset management firms have begun not only building formal enterprise architectures, but benchmarking them against others' as well. |
JavaWorld August 2001 Scott Stark |
Integrate security infrastructures with JBossSX The current Enterprise JavaBean and Servlet specifications omit integration between the application server and existing security infrastructures. This article describes how version 2.4 of the open source JBoss application server security extension project (JBossSX) uses Java Authentication and Authorization Service (JAAS) login modules as its integration API. |
InternetNews May 21, 2004 Clint Boulton |
Microsoft Indigo Architect John Shewchuk One of the builders behind the Indigo messaging platform talks up how it works and how it fits into the OS puzzle. |
D-Lib Jul/Aug 2002 Mairead Martin |
Federated Digital Rights Management A proposed drm solution for research and education. |
InternetNews February 15, 2006 Erin Joyce |
Sparks of Life (and Green) in Smart Cards More than 60 vendors - hardware, software and everything in between - are promising to line up better identity protection and authentication tools for businesses and consumers. |
Wall Street & Technology January 23, 2007 Cory Levine |
VASCO Bolsters Tokens The strong authentication vendor has bolstered its hardware authentication offerings with the release of two new user authentication products for online commerce. |
Wall Street & Technology September 24, 2007 Anne Rawland Gabriel |
Glenmede Trust Company Streamlines With Imprivata SSO Solution Imprivata enables Glenmede to streamline productivity and security with One-Sign single sign-on solution. |
Bank Technology News October 2005 Glen Fest |
Uncle Sam Comes Knocking The U.S. government's interest in having banks help it form networks of federated identity, thus allowing vetted, shared user-credentials between government and private industry, is obvious. The looming question: What's in it for banks? |
Wall Street & Technology February 19, 2008 Penny Crosman |
The Future of SOA on Wall Street Read on to uncover the next SOA innovation on The Street for those companies that are ready to deploy next-generation solutions, and want to make it a top IT priority. |
JavaWorld September 2002 Visveswaran & Abulsorour |
Business process automation made easy with Java, Part 1 Business process automation initiatives are transforming today's enterprises by optimizing efficiencies, reducing costs, and increasing shareholder value. This article explains existing J2EE-centric rule engine solutions, as well as where and how they fit within an enterprise architecture. |
Insurance & Technology August 12, 2005 Anthony O'Donnell |
Journey to Service-Oriented Architecture Fireman's Fund turns to service-oriented architecture in an effort to consolidate up to 70 percent of its technology applications with the goal of transforming its IT organization into a more efficient and more flexible operation. |
InternetNews July 23, 2010 |
Oracle Offers New Identity Management Suite Oracle Identity Management 11g is designed to "radically" simplify application security. |
Insurance & Technology July 9, 2008 Nathan Conz |
Insurers Target Single Sign-On Capabilities There is little evidence of centralized depositories for user IDs and log-ons that consolidate the number of passwords that an employee, business partner or customer needs to access a carrier's systems. |
CIO June 15, 2003 Larry Downes |
Unleashing Killer Architecture: The Shape of Things to Come The coauthor of Unleashing the Killer App deconstructs the new-order IT architecture that will connect tomorrow's information supply chain. |
CRM June 2015 Leonard Klie |
In Data Security, It's a Numbers Game Requiring multifactor authentication makes it harder for hackers to access information |
Wall Street & Technology March 21, 2006 Paul Allen |
Add Another Bolt to the Cyber Door Due to enhanced and evolving cyber-threats, financial institutions now must implement some form of multifactor authentication or layered security to protect sensitive customer data. |
InternetNews February 26, 2004 Michael Singer |
Government Groups Tout Single Sign-On Version GSA and OASIS demonstrate Single Sign-On for a federated identity, which some say is years ahead of Liberty or WS-Federated. |
CIO October 15, 2003 Ben Worthen |
Identity Crisis Identity management projects promise big returns, but be prepared for long, complex implementations. |
Bank Systems & Technology January 30, 2005 Phillip Britt |
Who Goes There? The nation's third-largest bank, Bank of America has grown largely through M&As. Among the many integration challenges faced by the bank, standardizing employee authentication procedures has been a critical issue. |
Insurance & Technology September 14, 2004 Anthony O'Donnell |
Carriers Give OK to SOA A services-oriented architecture carries a hefty initial price tag, but can reduce the time and cost of application development for insurers and open doors to business partners. |
InternetNews November 8, 2005 Clint Boulton |
Liberty Needs to Know Who You Are The Liberty Alliance Project creates a group to help companies bring authentication into their folds. |
Wall Street & Technology November 19, 2008 Melanie Rodier |
Case Study: Loomis Sayles Implements Multifactor Authentication Loomis Sayles deploys the Imprivata OneSign Authentication Management solution, enabling authentication via password, fingerprint and token. |
Insurance & Technology May 18, 2007 Nathan Conz |
SOA Adopters Discuss Best Practices Industry IT executives, analysts and vendors all have different opinions on just how pervasive SOA has become in insurance. |
JavaWorld October 2000 Anil Hemrajani |
Do you really need Enterprise JavaBeans? Anil Hemrajani offers his opinions on whether Enterprise JavaBeans are really necessary... |
CAUSE/EFFECT Vol 22 Num 4 1999 Kenneth J. Klingenstein |
Middleware: The Second Layer of IT Infrastructure A second wave of network invention and deployment has begun. Riding on top of the physical Internet protocol (IP) connectivity that drove the first generation of networking, this effort adds "logical" connectivity to the networked infrastructure.... |
InternetNews February 14, 2005 Michael Singer |
VeriSign Revamps Security Lineup The security vendor makes renewed pitch for two-factor authentication to protect against security threats. |
CRM February 2006 Marshall Lager |
SOA Simple An examination of service-oriented architecture and its growing impact on the applications landscape. |
JavaWorld April 2001 Bin Yang |
E++: A pattern language for J2EE applications, Part 1 E++, an Alexandrian pattern language, describes the process for creating a J2EE framework. Compared with a loose pattern collection, E++ provides rules for design patterns to work together in solving a set of related problems... |
Bank Systems & Technology May 1, 2006 Lisa Valentine |
Collaboration Is Job One An interview with Financial Services Technology Consortium executive director Daniel Schutzer on fostering a more collaborative environment regarding technology in the financial services industry. |
CIO August 15, 2005 Christopher Lindquist |
A New Blueprint for IT A service-oriented architecture can be a powerful tool for changing your business-or a good way to boil the ocean. The keys to a successful SOA project are setting limits, mitigating risks, and giving the business what it wants and needs. |
JavaWorld April 18, 2003 Coen & Nanduri |
Jump the hurdles of Struts development Building and maintaining enterprise applications is very difficult. Designing elegant and easily maintainable user interfaces for these applications can be the most daunting task of all. |
Bank Systems & Technology February 18, 2009 Ashfield & Shroyer |
Security Management: An Ongoing Challenge for Banks Banks face a difficult challenge in the area of security management. |
New Architect August 2002 Jim Jagielski |
What You Get Is What You See Keeping an eye on web performance. |