对于两个服务应用程序的安全考虑。
SaaS应用程序的安全需求。
下面,定义特定于应用程序的安全性。
xml中保护应用程序的安全性配置。
Security configuration protecting the application in web.xml.
需要定义Web应用程序的安全约束。
You will need to define a security constraint for the Web application.
测试Web应用程序的安全配置。
启用EJB应用程序的安全性。
下面定义应用程序的安全性。
配置示例应用程序的安全性。
JVM可以提供用于应用程序的安全性管理器或沙箱。
The JVM can provide a security manager or sandbox for applications.
这种做法通常会导致应用程序的安全性或可伸缩性降低。
Doing so typically causes an application to become either less secure or less scalable.
必须了解的是,安全功能本身不能保证数据库应用程序的安全。
It is important to understand that security features alone cannot guarantee a secure database application.
安全性警告:错误地使用该对象可能危及你应用程序的安全。
Security Alert Using this object incorrectly can compromise the security of your application.
这一段的目的是描述如何应用AOP 技术实现应用程序的安全。
An Experience Report The goal of this section is to describe how AOP can be used to implement application security.
数据库级的安全措施,包括身份验证和授权,也可以用于加强应用程序的安全性。
Database-level security measures including authentication and authorization might also be used to enhance application security.
应用开发人员需要和布署人员沟通,怎么样来保证布署应用程序的安全。
Application Developers need to communicate to Deployers how the security is to be set up for the deployed application.
状态的所有者负责发起转换,从而驱动应用程序的安全模型(也请参见图5)。
The owner of the state is responsible for initiating the transitions, so drives the security model of the application (also see Figure 5).
本系列的后续文章将谈到定制和配置应用程序的安全性,这有很多不同的方式。
The many different ways you can customize and configure the security aspects of the application will be covered in subsequent parts of this series.
如果前面没有首先部署应用程序的安全性部署计划,应用程序在这里会部署失败。
If you did not first deploy your application's security deployment plan previously, your application will fail to deploy here.
业务流程和策略管理组件使用了下面的安全组件,以实现它对业务应用程序的安全职责。
The business process and policy management component USES the following security components to fulfill its security obligations to the business applications.
我们希望确保当选择生成JSP示例代理应用程序时自动生成的示例JSP应用程序的安全。
We want to secure the sample JSP application that is automatically generated when selecting the generation of the JSP sample proxy application. To do this.
验证与业务应用程序的安全性和功能一样重要,核心的应用程序逻辑通常和验证程序混杂在一起。
As important as it is to the safety and functionality of your business applications, core application logic is often cluttered with validation routines.
作为一个展示两者不同的注意事项的示例,外部应用程序的安全考虑要比内部应用程序的严格得多。
As an example to show how each deserves different considerations, security concerns of external applications are much more stringent then internal applications.
LotusNotes还提供一个应用程序开发环境,其中已经建立了一个设计并跨企业部署应用程序的安全模型。
Lotus Notes also provides an application development environment with an established security model to design and deploy the application across the enterprise.
当然不是所有的应用程序都会访问关键数据,但这些程序的开发人员确实能够通过加入访问控制来增强其应用程序的安全。
Certainly not all applications access critical data, but developers of those that do can enhance the security of their applications by building in access control.
您可以在 war_realm/dist目录中找到这个Web应用程序的安全版本,名称为petsecure.war。
You can find this secured version of the Web application in the war_realm/dist directory, called petsecure.war. Deploy this to Tomcat using
对于其他的Web应用程序,请在部署描述符里面使用security - constraint元素来规定应用程序的安全约束。
For other web applications, use a security-constraint element in the deployment descriptor.
曾在InfoQ中发布过owaspTop10列表,它所关注的是web应用程序的安全风险,而CWE的Top25的覆盖范围更广,包括著名的缓冲区溢出缺陷。
While the OWASP Top Ten list, presented by InfoQ, focuses on web application security risks, the CWE Top 25 covers a broader range of issues including the famous buffer overrun vulnerability.
曾在InfoQ中发布过owaspTop10列表,它所关注的是web应用程序的安全风险,而CWE的Top25的覆盖范围更广,包括著名的缓冲区溢出缺陷。
While the OWASP Top Ten list, presented by InfoQ, focuses on web application security risks, the CWE Top 25 covers a broader range of issues including the famous buffer overrun vulnerability.
应用推荐