Strategic Study of CAE >> 2005, Volume 7, Issue 3
A Security Middleware for Web Applications Based on JavaBeans and Secure Cookie
Institute of Network Security , Shandong University , Jinan 250100 , China
Next Previous
Abstract
This paper discusses the secure operations in the web applications, and designs a framework of middleware. The paper implements the security middleware based on the “JavaBeans” and “Secure Cookie” technology. The middleware improves the efficiency of the web applications through hardware, and reduces the difficulty of development. In the end, the paper discusses the extension based on PMI system and RBAC to control the privilege.
Keywords
JavaBeans ; Secure Cookie ; middleware ; PMI ; RBAC
References
[ 1 ] Standish Group International. Middleware Handbook [M/OL]. Standish Group International, http://www. marketresearch. com/product/display. asp? Productid=719883, 2001-10-01
[ 2 ] R Housley, W Ford, W Polk, D Solo. Internet X. 509 Public Key Infrastructure, Certificate and CRL Profile [S]. RFC 2459, IETF, 1999-01
[ 3 ] RobertColeridge.ThecryptographyAPI , orhowtokeepasecret[DB/OL].MicrosoftDeveloperNetworkTechnologyGroup, MSDNLibrary, 1996-08-19
[ 4 ] RSALaboratories.PKCS #11:CryptographicTokenInterfaceStandard[S/OL ].http://www.rsasecurity.com/rsalabs/node.asp?id=2133, 2001-11
[ 5 ] SunMicrosystems.JavaTM CryptographyExtension (JCE) ReferenceGuide[S/OL].SunMicrosystems, http://java.sun.com/j2se/1.5.0/docs/guide/security/jce/JCERefGuide.html, 2004-01-29
[ 6 ] RSALaboratories.PKCS #7:CryptographicMessageSyntaxStandard[S/OL].http://www.rsasecurity.com/rsalabs/node.asp?id=2129, 1993-11-01
[ 7 ] ShengLiang.JavaTM NativeInterface:Programmer sGuideandSpecification[M ].AddisonWesleyPubCo, 1stedition, 1999-06-10
[ 8 ] GregVoss.IntroducingJavaBeans[C ].SunMicrosystems, http://java.sun.com/developer/onlineTraining/Beans/Beans1/, 1996-11