You need to enable JavaScript to view more than 15 articles by this author.
WS-Security in the Enterprise, Part 2: The Framework
Publish Date: Mar. 30, 2005
Denis Pilupchuk continues his series on developing a WS-Security toolkit by developing a general framework to match the needs identified in part one and by starting to map WSSE features to Java objects.
WS-Security in the Enterprise, Part 1: Problem Introduction
Publish Date: Feb. 9, 2005
WS-Security doesn't exist in a vacuum--in an enterprise, it must work with many other systems, which means dealing with other access control systems and potential incompatibilities. Denis Pilupchuk begins his series on integrating WS-Security and enterprise systems by spelling out where the problem lies and what pieces need to be created to resolve it.
Java vs .NET Security: Epilogue
Publish Date: Jul. 7, 2004
Having surveyed the current state of the art of security in Java and .NET, Denis Piloptchouk returns to continue the story. In this epilogue from the new O'Reilly eDocument Java vs .NET Security , he looks at where the two platforms are headed in the near future.
Java vs. .NET Security, Part 4
Publish Date: Feb. 25, 2004
Java and .NET address similar code security issues, but which one offers the best security implementation? Denis Piliptchouk's series concludes with a look at user authentication and permissions, and a final wrap-up.
Java vs. .NET Security, Part 3
Publish Date: Jan. 28, 2004
Java and .NET address similar code security issues, but which one offers the best security implementation? Denis Piliptchouk's series continues with a look at how each platform handles code protection and code access.
Java vs. .NET Security, Part 2
Publish Date: Dec. 10, 2003
Java and .NET address similar code security issues, but which offers the best security implementation? Denis Piliptchouk's series continues with a look at cryptography support.
Java vs. .NET Security, Part 1
Publish Date: Nov. 26, 2003
Java and .NET address similar code security issues, but which one offers the best security implementation? Denis Piliptchouk's series starts with a side-by-side look at how each performs configuration, code verification, and memory isolation.