338
Conclusion
security scenarios. In particular, it described the declarative security approach and
mechanisms used in the platform and how the platform handles authentication,
authorization, and transport layer security.
The chapter described how to implement a secure environment using the
JAX RPC technology. It discussed the JAX RPC endpoint and client program 
ming models, and how each model handles authentication, authorization, and
transport layer security. The chapter also introduced the message level Web
service security model and provided guidelines for using this approach to security. 
The next chapter, about the architecture of an actual Web service application,
puts all the conceptual information covered so far into practice. 






footer




 

 

 

 

 Home | About Us | Network | Services | Support | FAQ | Control Panel | Order Online | Sitemap | Contact

 

Our web partners: Inexpensive Web Hosting Java Web Hosting personal webspace webspace php  linux webhost

 html web templates DreamweaverQuality Web Templates PSD Web Templates

cheap webhost j2ee web Hosting buy webspace ftp webspace adult webspace

frontpage WebHosting webspace hosting cheap webhost

Visionwebhosting.net Business web hosting division of Vision Web Hosting Inc.. All rights reserved

aol web hosting