338
Conclusion
security scenarios. In particular, it described the declarative security approach and
mechanisms used in the platform and how the platform handles authentication,
authorization, and transport layer security.
The chapter described how to implement a secure environment using the
JAX RPC technology. It discussed the JAX RPC endpoint and client program
ming models, and how each model handles authentication, authorization, and
transport layer security. The chapter also introduced the message level Web
service security model and provided guidelines for using this approach to security.
The next chapter, about the architecture of an actual Web service application,
puts all the conceptual information covered so far into practice.
footer
Our web partners:
Inexpensive
Web Hosting
Java Web Hosting
personal webspace
webspace php
linux webhost
html web templates
DreamweaverQuality Web Templates
PSD Web Templates
cheap webhost
j2ee web Hosting
buy webspace
ftp webspace
adult webspace
frontpage WebHosting
webspace hosting
cheap webhost
Visionwebhosting.net Business web hosting division of Vision Web Hosting Inc.. All rights reserved
aol web hosting