Introduction To Web Architecture

Size: px
Start display at page:

Download "Introduction To Web Architecture"

Transcription

1 Introduction To Web Architecture 1

2 Course Objectives Understand the Request - Response Cycle Understand the various options available in terms of servers To be able to understand the various types of components of a web application Understand interaction between the components Understand the tier-ed architecture of Internet Applications 2 This course covers Http Request and it s contents Http Response and it s contents Introduction to various Web servers Introduction to various types of components N Tier architecture 2

3 Course Objectives (Contd ) To be aware of the issues involved in security, performance at the client and server end Understand the need of Confidentiality, Authentication, Authorization, Performance Management for web applications To appreciate architecture documents Overview of basic Sun Architecture Overview of basic Microsoft Architecture 3 Awareness of the security, performance issues in web applications. The second chapter covers architecture documents, Sun Architectures, Microsoft Architectures etc. 3

4 Session Plan 1 lecture session Basics of Web Architecture Overview of Sun and Microsoft Architectures 4 The first chapter covers overview of World Wide Web, the meaning of basic terms popularly used in architecture documents of web applications. It also covers awareness about security and performance related issues. Few sample Architecture documents using Microsoft and Sun Technologies are covered in the second chapter. 4

5 References Current Web Architecture found online at Introduction to Web Architecture found online at Architecture of the World Wide Web found online at Andres, Great web architecture book, IDG books,1999 Derek & Atkins, Internet Security - Professional Reference, Publisher Techmedia, 2001 Comer Douglas E, Computer Networks and Internets 2nd edition, Publisher Prentice Hall,

6 Basics of Web Architecture Topic Estimated Duration Basic Terms in Web Architecture 20 min Web Servers 20 min Components of a Web Application 30 min Issues involved in security, performance of Web applications 30 min 6 This chapter covers the meaning of basic terms like Web Server, App Server etc. It also covers the working of Web Servers, various components hosted by the servers The chapters aims at introducing security, performance issues of Web applications 6

7 Differences in Internet and World Wide Web Internet : The Internet is a network of networks Information travels over the Internet, via a protocols (TCP/IP) The World Wide Web, (popularly known as web) is the way of accessing information over the medium of the Internet. the model of sharing information and that's why is sits on the of the Internet 7 7

8 Web Architecture Why architect the Web Applications? What is N "Tier architecture? 8 Usually developers would like to attack the programming as soon as they encounter a problem. We must realize there is lot more to programming than simple coding. Coding web-application without architecting it can result in critical problems at the later stage because Web applications run under environments like browser, web servers, application servers and they communicate using specific protocols like HTTP One can compare this to building a huge complex without involving a good architect or by bypassing the Architecture stage. The architecture is the winning factor of the web-application ( which might become the losing factor if not handled properly). In this course we will talk about architecting the Web applications and the importance of the same. What is usual N Tier architecture of Web applications? In an web application, usually the terms tier and layer are used interchangeably. N "Tier architecture can be defined as two or more levels arranged one above another where each level serving distinct and separate tasks like presentation, business logic, data access etc. Any number of such levels (or tiers) can be arranged above another. Web Applications usually use N-tier architecture because it provides a model for flexible /reusable/ maintainable application. By breaking up a system into tiers, developers only have to modify or add a specific tier, rather than rewriting the whole application, if a particular tier (say database) needs change or if the application needs to scale up. An example for the same in real life is that a CAR is more scalable than 3 wheeler which is more scalable than a Bi-Cycle. 8

9 N "Tier architecture Data Tier also known as back end tier The Presentation Tier also known as front end tier The Business Logic Tier also known as brain of the application 9 Data Tier: Is always a part of Web-application. Though System can exist without data tiers, all real-life examples explicitly need a data tier to handle the complex requirements of data storage. This layer is the Database Management System (usually RDBMS). It can be very complex like a high-end product (Oracle/SQL Server), which do include features like backups/recovery/query optimization etc. Or it can be the simplistic plain text files. Famous formats of structured, plain text files are CSV files, XML files, etc. This tier is to deal with the storage and retrieval of the information. It is not about manipulating or styling the data. It is also known as back end tier The Presentation Tier : This layer provides an interface for the end user into your application. It takes the results of the Business Tier (mentioned below) and renders the data into formats like HTML (for browser users) or WML (for Mobile users) or the other formats readable by the end user of the system. It is also known as front end tier. The Business Tier :This is called as brain of the application. It contains business rules used for data manipulation etc. For example, if you're creating a application to calculate the tariff of a courier then you might want to consider the details like weight, delicacy, mode of sending for a courier. Also the discount depends on who is sending the courier etc. This logic is called as business Logic. 9

10 Basic Terms in Web Architecture Web server E.g. Tomcat, IIS Application Server E.g. Weblogic, WebSphere 10 We will go through meaning of some basic terms before we understand the complete structure of these tiers. Web server Is a computer that serves Web pages to specific clients like Web Browser. When you type in the browser, then it searches for a Web Server corresponding to this URL on the web. Every web server has an IP address and host name. For example, the URL sends a request to the server which maps to the domain name infosys.com. The Web server then fetches the page named index.html and sends it to your browser. Any computer which has web server software (for ex: Apache/Tomcat) installed on the same is called as Web server. This machine is usually it is connected to the Internet so that it can be accessed from anywhere. But for the servers which are used over intranet, the access is limited and that s why they do not need to have connection to Internet. Application Servers A machine having a software called Application Server( for example WebSphere/ Inprise Application Server) installed on the same and which provides various services to many types applications is called application server. For Examples, An application might need to store it s data in Database. The ready made product called application server can help in this by creating the required connections to the database. This reduces the burden on the application developer and helps in increasing productivity. Example: There are various companies who have developed application Server Products. Example Weblogic by Bea, Oracle 11i AS Portal Server 10

11 Basic Terms in Web Architecture (Contd ) Directory service Search engines Persistence 11 Directory service Directory service is repository for information about objects located on networks, such as applications, files etc. Directory services provides a consistent way to name (or register) these objects when they are created, describe their functionality, locate them from client machines, access their methods, and provide secure way to connect to them. With web applications, there are various network resources that need to be contacted from various locations. Such resources register themselves with Directory Service. While registering a unique name has to be provided to these objects. Directory service acts as database to store this unique name and the corresponding object. The clients contact directory service to find the relevant objects by providing the corresponding name. ( Just like you use the telephone directory by providing the appropriate employee ID) Directory Service then identifies these resources and makes them accessible to users according to the access rules specified for the resource. Ideally, the directory service should be developed in such way that the client need not depend on the network topology or protocols to access any resource. For example Java Naming and Directory interface, Lightweight Directory Access Protocol Search engines A program that searches documents for specified keywords and returns a list of the documents that match the specified keyword is called as Search engine. For ex: Google.com Although search engine is generic word, the term is often used to specifically describe systems like Google, Alta Vista and Excite that enable users to search for documents on the World Wide Web Persistence service Persistence Service is offered by various application servers to persist the volatile data into the database. The volatile data is usually in the form of Objects or sometimes in form of a new Markup language named XML. Persistence is the service which can automate the storage of this volatile data into the database 11

12 Basic Terms in Web Architecture (Contd ) Load balancing Transaction management Authentication / authorization service 12 Load balancing Load balancing is distributing processing and communications activity evenly across a computer network so that no single device is overwhelmed. Load balancing is especially important for networks where it's difficult to predict the number of requests that will be issued to a server. Busy Web sites typically employ two or more Web servers in a load balancing scheme. If one server starts to get swamped, requests are forwarded to another server with more capacity. Load balancing can also refer to the communications channels themselves. Transaction management In the scenario of a web application, Transaction Management becomes even more crucial because various clients would be contacting the same resource simultaneously. The code included in the web application needs to clearly indicate the begin and the end of transactions and the various isolation levels associated with a transaction. This can either be done with code or can be done with the help of Application Server. Application Server provides a facility to declare the isolation levels of transaction and auto generates code for the same. This is called as Declarative Transaction management. It is one of the most popular service provided by different application severs. Authentication / authorization service Authentication service helps is identifying a user and authorization service helps to find out whether the user has access rights to the required resource. Example: JASS (Java Authentication / authorization service) helps in fulfilling authentication / authorization requirement 12

13 Web Servers Web Browsers Web Site HTTP Web Server Web Content (HTML Pages) 13 Web Browser here acts as a Client providing us a means to send the request to the server. Various browsers like Internet explorer and Netscape Navigator are famous products in the browser market. Web Server provides services to the clients which are sending request over HTTP protocol. 13

14 HTTP Protocol Document Request Web Browser Server sends the document to Browser HTTP/1.0 was the original version Web server searches for the document Web Server Server retrieves the document HTTP 1.1 HTTP1.1. provides Persistent Connection on file system File System 14 Client Listens to Port 80 Server Connects to Port 80 Accepts the Connection Writes GET/index.html HTTP/1.0 \n\n Reads up until the second end of the line (\n) Sees that the GET is the known command And that HTTP 1.0 is a valid protocol version Reads a local file named /index.html Writes HTTP/ OK \n\n. Copies the contents of the file into the socket Reads the contents of the files and displays it Hangs up Hangs up This last step of hanging up after each interaction was accurate with HTTP1.0. HTTP1.1 provides Persistent Connection that can be used by the browser for the next request/response. While using HTTP1.1 the connection would not be closed. Instead the same connection is used in the next interaction by the browser. 14

15 HTTP Protocol ( Contd ) HTTP defines a simple request -response protocol Client sends the Request to server - HTTP Request Server sends the Response to the client - HTTP Response Application Layer protocol on TCP/IP Suite Stateless Protocol 15 HTTP Request is sent to the server and the Server sends a response in the format that is understood by the client. Though this cycle sits on HTTP, the underlying still remains the TCP-IP. What is Stateless: Stateless means having no information about what occurred when the user previously accessed this application. Current applications maintain state, which means that they remember what you were doing last time you used the application. It means you can change the application according to a user s previous interaction/ personal likings in terms of fonts/colors. The HTTP protocol is stateless because each request for a new Web page is processed without any knowledge of previous pages requested. This is one of the main drawbacks to the HTTP protocol. So the programmer find it difficult to code the web sites that intelligently react to the user input. Because maintaining state is extremely useful, people have developed techniques to add track the state. These include server APIs, cookies etc. You will learn about cookies and these APIs in further course. 15

16 Http Request : GET Vs POST method Get In the server script that handles the submitted information, the form data is retrieved from the QUERY_STRING environment variable.environment variables are the variables that are automatically created by the server for each process. Post The form data is available on STDIN,which is a handle for the standard input. It defines the input stream for the program. If the user bookmarks a GET page, the querystring info will also be saved with it. A querystring also shows up in the history list.get isn t very secure. With POST, the data is not cached either in the history or in the bookmark so it is more secure. 16 In GET, since the form data is part of the URL, ends up in the server logs while as in POST data does not make it into the server logs GET has a limit on the length of the querystring which depends on the browser (usually 255) and there is almost no size limits on a HTTP header. The data sent in the querystring is visible in the address bar and that s why not very safe. The data sent using the POST method is not visible in the address bar and that s why it is more safe. 16

17 HTTP Request An HTTP Request can have an initial line (method, URL, Protocol Ver. ) Zero or More header lines (its configuration and acceptable doc formats) a blank line an optional message body (additional data) Demo : Eg. GET /index.html HTTP/1.0 User_Agent: Mozilla/3.0Gold Accept: text/plain Accept: text/html 17 17

18 HTTP Response An HTTP Response can have Initial line or Status line ( Server HTTP Ver, Status-code, Reason) Headers - Description of the header info in the response Message body - Actual information requested 18 18

19 Example of HTTP Response Eg. Response for /index.html HTTP/1.0 Status 200 OK Server : NCSA/2.0 Date: Mon, 10 Mar :04:04 GMT Content-type: text/html Content-length: 5800 Last-modified: <Actual Date> <html> <head> <title>xyz Home Page</title> </head> <body>... other content of /index.html

20 Various components of Web Application Web Servers host Various components of Web Applications E.g. Active Server Pages ( ASP) /ASP.NET Technology is developed by Microsoft. ASP uses scripting language as VB Script ASP.NET uses any compliant language like VB. NET or CSharp as scripting language 20 Active Server Pages Abbreviated as ASP, a specification for a dynamically creating Web page with a.asp extension that uses scripting languages usually VB Script or Jscript code for creating the dynamic web page. When a browser requests an ASP, the Web server generates a page with HTML code and sends it back to the browser. 20

21 Various components of Web Application (Contd..) Java Servlets Technology is developed by Sun. Defined as Java Program best suited to handle and route Web requests 21 Java Servlets Servlets are the units of Java programs that handle Web requests and routes the request to the appropriate element for processing. It can also generate dynamic HTML but is not well suited for the same being a Java Program. This is a technology by Sun Microsystems. 21

22 Various components of Web Application (Contd..) Java Server Pages Technology is developed by Sun. Uses Java as a scripting language 22 Java Server Pages Abbreviated as JSP, a specification for a dynamically creating Web page with a.jsp extension that uses scripting language as Java for creating the dynamic web page. When a browser requests an JSP, the Web server generates a page with HTML code and sends it back to the browser. This is a technology by Sun Microsystems. 22

23 Various components of Web Application (Contd..) Web Services Is a standard that can be implemented in many technologies Provide data and services to other applications 23 Web Services: Are units of logic providing data and services to other applications (usually to the remote and heterogeneous clients). Applications access Web services via standard Web protocols. For example, if CNN provides the temperature of various cities in world through web service then various sites can call this web service and receive the data in the standard format. 23

24 Few Popular Web Servers Microsoft s Personal Web Server + Freeware + Easy to setup and use + ASP support - Vulnerability : On Win95/98 allows files on the server to be read by an unauthorized user Best suited for testing and serving small web sites 24 Mainly used for personal web pages. Can host web applications like Active Server Pages ( ASP) 24

25 Few Popular Web Servers. Microsoft s Internet Information Server + performance and security enhancements. + Well-integrated server administration tools + Easy to configure & Better Clustering. - Only runs on Windows OS like WinNT Server /2000/XP Best suited for MS Platforms Mid Range Web server 25 It can be used for developing commercial web sites as well as for the intranet web sites for a company. Many sites used for the internal purpose in Infosys are working on IIS. Mainly used to host web applications like Active Server Pages ( ASP) 25

26 Few Popular Web Servers Apache - A PATCHy Server Origin: NCSA + Multi-platform support, protocol support HTTP/1.1 + Overall performance and robustness - More extensive technical support requires the purchase of a third-party support contract High-end enterprise server for Unix and Win32 Most preferred Web server 26 Apache is one of the oldest web severs which is still taking lots of market share even today. Now a days lots of plug in software are available for Apache which makes it possible to host various types of web applications like Active Server Pages ( ASP) Java Servlets Java Server Pages Java Servlets. 26

27 Few Popular Web Servers WebSphere: Web Server by IBM + Support for various web applications like Servlets/JSP + Unique services provided to communicate with the Legacy systems running on Mainframe Ex: CICS Transaction Gateway Best suited for large scale sites involving communication with legacy systems 27 It works on various platforms including IBM Mainframes 27

28 Performance of Web Application Performance of a web application is directly depending on the actual end-user response time. Performance of many Web sites depends on the load on the site at peak time 28 Performance in a Web application is very important because the Web applications are accessed remotely. When there is single user, web applications might provide good response but what about the loads of users? Imagine Testing a Web application s performance for 1 lakh simultaneous requests. We cannot do this by manual testing. So performance testing is normally conducted in a simulated environment with the help of performance testing tools. If the performance is not satisfactory, then various measures need to be taken to tackle the issues. In further chapter, we will look at various inherent problems in web applications like performance and security. 28

29 Heterogeneity involved in Web Apps Traditional apps generally have 1, 2 or 3 software pieces talking to each other e.g. VB ODBC (Open Database Connectivity) - SQL Server, or PowerBuilder - Native drivers - Sybase, or IBM CICS - DB2 Generally, the entire solution is from one or two collaborating vendors The wire protocol for communication between collaborating parts is proprietary; implying that it is difficult or impossible to extend the solution: i.e. replace the VB client with a different kind of client 29 It is essential to understand history of applications before we begin with the basic terms of web architecture. A Traditional application consists of the User Interface as the front tier and the Database at the back end. The connectivity is done with the help of standards like Open Data Base Connectivity, Java Data Base Connectivity etc. Usually all the tiers are coded with the help of products developed by a single company. Also the protocols used were proprietary because of that. The users of applications were known in advance. With the evolution of WWW (World Wide Web) we also need to concentrate on a) Searching the correct application before calling it. This is done with the help of Universal Resource Locators b) Represent the data in the standard data formats c) Use the required protocols for communication between different tiers d) Prepare for the large base of unknown users : Elaboration: Demography of users in a traditional applications are generally known in advance. Their login pattern, usage pattern, general behavior, etc are known in advance. Generally, users on an intranet are reasonably predictable. While as profile of users in an application exposed to the Internet is not known. They could be genuine buyers, hackers, frivolous people, frauds, or people all out to have some fun. Transaction rate is not known upfront; could vary by time of the day (or night!); there could be sudden peaks and troughs 29

30 Issues involved in performance of Web applications Following are the main reasons because which performance issues occur in Web Applications Web application inherently needs lots of layers as compared to traditional application. Many of these layers are remote. The load of an application (in general and at any given time) cannot be estimated accurately. And there is no seamless integration between multivendor products used in all these layers, so the performance of an application is not always predictable. Performance might go down because of the extra mechanism added like security 30 The issues can be further categorized as a) Component level issues b) Issues at the server level For some issues related to security and performance, the server level solution works well. For example, if the performance is decreasing because of the increase in load at peak hours, then the load balancing feature of a web server can be used. (The feature is discussed in detail in the sub-sequent slides). With this feature the load is spread out among various server machines. At the same time some care need to be taken at component level too. The programmer needs to make sure that components are capable of spreading out across various servers and still provide the required functionality. To take care of this the component has to be built according to the rules of certain standard. 30

31 Issues involved in security of Web applications Following are the main reasons because which security issues occur in Web Applications Users not known in advance Because of various types of users are connecting to a web application, the set of resources that they can access has to be limited depending on the user profile Information send out to particular user has to be protected 31 In the subsequent slides we will study about the various issues, their impacts on server side and at the component level 31

32 Load balancing Browser Load Balancing Software decides which server to direct traffic to Server 1 Server 2 Server 3 32 The solution to catering to the issue of heavy load on Servers is Load balancing. Assume that a courier industry is running across various geography locations and need to maintain the centralized repository of the data. In this case a single web server used by such application, may not be able to take the load from various requests coming in from different locations. For many such reasons, Popular web sites need ways to spread their load out - usually across multiple machines, and sometimes across multiple sites. Examining the access patterns for the site is crucial to the performance tuning and load balancing process. Scalability of the servers is enhanced by a technique known as load balancing. Quite a few times load balancing in database servers can be done with the concepts of disk arrays where there is single DB server software and an array of multiple disks ( few of which can be fall back disks) to store the data. But with web server or application server disk arrays don t help always because it s not just the question of storing the data but it also about various interlinked components running simultaneously which are contacted by load of users at a time. In this case a clustering of multiple servers (not just multiple disks) sharing the incoming load helps better. Round robin between these server is the most popular mechanism of spreading the load. The figure in the slide illustrates the concept of a load-balanced Web server mechanism. 32

33 Consequences The programmer needs to make sure that components are capable of spreading out across various servers still provide the required functionality. 33 If proper care is not taken while coding these components then when components are spread across multiple servers, the clients of these components get affected. For example, In the past, a component named tariffcalculation was used by another component (Called as client) which was also present on the same machine where tariffcalculation component was deployed. Now with the recent load balancing requirement, this component is spread across various servers and so are the clients. This reflects certain change in the details of the tariffcalculation component that are be known to the client. If the component has built-in facilities to accommodate these changes, then using load balancing is done smoothly. To take care of various such issues the component has to be built according to the rules of certain standard. 33

34 Standards available for building Components - CORBA CORBA Customer has Account Java onwin 95 C++ on Unix places Order creates Shipment contains Item can be PC PC TV TV Book COBOL on MVS 34 CORBA: Short for Common Object Request Broker Architecture, an architecture that enables pieces of programs, called objects, to communicate with one another regardless of what programming language they were written in or what operating system they're running on. For example, a program coded in Java can call a function in COBOL with help of this technology The diagram shows three modules of an enterprise application namely Customer: Coded in Java Account : Coded in C++ Order Processing: Coded in COBOL These are interrelated modules and the interaction is made possible with CORBA technology. 34

35 COM+ Server Object Client 35 COM+ : Component Object Model +, an extension of the Component Object Model (COM) to receive the standard services from the servers like MTS (Microsoft Transaction Server) COM+ was developed by Microsoft The diagram shows the server, the object and the client. The object contains the required logic which is needed by the client. The server takes care of various objects by providing them services like persistence, transaction management etc The client contacts the required object and receives the results. 35

36 .NET C# VB.NET JScript Any.Net Compliant Language Common Language Specification (Basis of Common Language Runtime) ASP.NET Windows Forms ADO.Net and XML Base Class Library /. Net Framework Common Language Runtime ( CLR) Visual Studio.NET Windows OS COM+ Services 36.NET : Is suite of products for operating, managing and creating the workflow of Web Applications and web services.net is a different subject in itself. The brief introduction of each part is stated below. The order is from Bottom to Top Windows is the OS and.net currently runs only on windows platform COM+ Services are services like Life Cycle Management/ Transaction Management/ Persistence. The CLR Common Language Runtime makes sure that the objects written in different languages can communicate with each other. Base Class Library is the ready made set of classes for faster code development ADO.NET and XML ADO.NET is the Microsoft way for the application to talk to the database. The base class library also gives extensive support for reading and manipulating XML files. ADO.Net is the XML based technology. ASP. NET is the is server side code which would be hosted on the IIS Server and it can be developed in any.net compliant language like VB.NET, C Sharp etc Windows Forms are required for console based application. They are used to create the graphical user interface. Common language Specification Is published by Microsoft. It describes the rules of a.net compliant language. Any language which follows these rules can be used in.net So this in turn is an invitation for the vendor companies to write more and more.net compliant languages Visual Studio.NET is the powerful Integrated Development Environment for developing the code using.net technology 36

37 J2EE Applet Container Web Component WebContainer Enterprise Component EJB Container JSP/Servlet EJBs Database Application Client Container 37 The diagram shows the typical Four tier architecture. In this architecture, the request is initiated from browser/java application. The request is received by the web server and is routed to the appropriate Servlet component. Enterprise JavaBeans (EJB) is a Java API developed by Sun Microsystems that defines a component architecture for multi-tier client/server systems. Servlet analyzes the request and passes it on to the EJB for processing that needs the business logic and data access. EJBs in turn produces the results and the JSP formats the results and sends it back the browser. 37

38 Catering to the problem of Confidentiality Following are the two main techniques used to cater the problem of Unknown User Profiles in the web applications. Authentication Authorization Various ready APIs are available for the same JAAS (Java Authentication and Authorization Service Various techniques like Single signon are also widely used by sites Microsoft Passport etc 38 Authentication: Let us consider the example of Campus connect link on the Infosys Web-site. Whenever anybody accesses the Campus connect web application from Infosys Web-site, the username and password is checked to make sure that only authentic users get to entry in the application. This process of identifying an individual, based on a username and password is called as authentication. Most of the web-sites ask you to explicitly register to get this username and password. Most of the Intranet application uses your Windows (OS) login-id and password to authenticate you. Authentication is distinct from authorization, which is the process of giving access to certain objects of system to certain individuals based on their identity. For example delete department can be accessed only by certain group of people. Authentication just ensures that the user name and password is valid but does not deal with the access rights of the individual. Authorization The process of granting or denying access to a resource is called as Authorization. Most of the web-application first complete authentication and then go for authorization, which allows the user access to resources based on the user's identity. For example, in campus connect application only few users would have access to modify the course material kept at the site while as the students would be able to view the contents. This checking is done through authorization. Single signon It is a process of authentication where the user, or client, can enter one name and password and have access to more than one application or access to a number of resources within an enterprise. Single signon takes away the need for the user to enter further authentications when switching from one application to another. Single signon is abbreviated as SSO. Microsoft.NET Passport gives users a single, convenient way to sign in to multiple Internet sites and services using one sign-in name and password. It also allows to store personal information in the.net Passport profile and, if you choose, automatically share that information when signed in so that personalized services can be provided. 38

39 Techniques for Authentication Following are few techniques Applying Operating System level authentication, by impersonating login credentials of the client. Authenticating the client programmatically. Token wise authentication. Examples: Digital certificate 39 A) Applying Operating System level authentication, by impersonating login credentials of the client. This involves a setting with the server software which instructs the server to request the OS level credentials (for example Windows Login Id and Password) and authenticate the users by their OS dependant credentials Usually the Intranet Systems prefer this authentication so that the existing set of Logids and access permission can be utilized B) Authenticating the client programmatically involves creating a set up of Users Ids and access control Lists of these users and their roles. Many software products like LDAP Authentication Techniques can be used in this case. C) Token wise authentication is covered in next slides. 39

40 Catering to the problem of Information Protection Secure communication is ensured by using an industry standard protocol called SSL (Secure Socket Layer) Cryptography Symmetric and A-Symmetric key Encryption for confidentiality Certificates for authentication and non-repudiation 40 SSL SSL is short form of Secure Socket Layer is a protocol designed by Netscape Communications to enable encrypted, authenticated communications across the Internet. URLs starting with are known to use this layer Cryptography Is the process of protecting information by transforming it into an unreadable format, called cipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text. With the electronic security is becoming increasingly important, Cryptography is widely used to protect the data. One of the most popular cryptography systems used on the Internet is Pretty Good Privacy because it's effective and free. Cryptography systems can be broadly classified into symmetric-key systems that use a single key that both the sender and recipient have, and asymmetric-key systems that use two keys, a public key known to everyone and a private key that only the recipient of messages uses. Digital certificate Is an attachment to an electronic message used for security purposes. The common use of a digital certificate is to verify that a user sending a message is the one who he or she claims to be, and to encode the reply and send it to receiver. A person who wishes to send an encrypted message applies for a digital certificate from a Certificate Authority (CA) The CA issues an encrypted digital certificate containing the applicant's public key and a variety of other identification information. The CA makes its own public key readily available through print publicity or perhaps on the Internet. The recipient of an encrypted message uses the CA's public key to decode the digital certificate attached to the message, verifies it as issued by the CA and then obtains the sender's public key and identification information held within the certificate. With this information, the recipient can send an encrypted reply. The most widely used standard for digital certificates is X

41 Summary We Covered What is WWW The Basic Terms of Web Architecture The tier-ed architecture of Web Applications Various options available in terms of servers Various types of components of a web application Awareness about the issues involved in security, performance at the client and server end 41 41

42 Thank You! 42 42

Introduction To Web Architecture

Introduction To Web Architecture Introduction To Web Architecture 1 Session Plan Topic Estimated Duration Distributed computing 20 min Overview of Sun Microsoft Architecture 15 min Overview of Microsoft Architecture 15 min Summary 15

More information

Excerpts of Web Application Security focusing on Data Validation. adapted for F.I.S.T. 2004, Frankfurt

Excerpts of Web Application Security focusing on Data Validation. adapted for F.I.S.T. 2004, Frankfurt Excerpts of Web Application Security focusing on Data Validation adapted for F.I.S.T. 2004, Frankfurt by fs Purpose of this course: 1. Relate to WA s and get a basic understanding of them 2. Understand

More information

Lecture 9a: Sessions and Cookies

Lecture 9a: Sessions and Cookies CS 655 / 441 Fall 2007 Lecture 9a: Sessions and Cookies 1 Review: Structure of a Web Application On every interchange between client and server, server must: Parse request. Look up session state and global

More information

CNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies

CNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies CNIT 129S: Securing Web Applications Ch 3: Web Application Technologies HTTP Hypertext Transfer Protocol (HTTP) Connectionless protocol Client sends an HTTP request to a Web server Gets an HTTP response

More information

Introduction. Enterprise Java Instructor: Please introduce yourself Name Experience in Java Enterprise Edition Goals you hope to achieve

Introduction. Enterprise Java Instructor: Please introduce yourself Name Experience in Java Enterprise Edition Goals you hope to achieve Enterprise Java Introduction Enterprise Java Instructor: Please introduce yourself Name Experience in Java Enterprise Edition Goals you hope to achieve Course Description This course focuses on developing

More information

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed. Technical Overview Technical Overview Standards based Architecture Scalable Secure Entirely Web Based Browser Independent Document Format independent LDAP integration Distributed Architecture Multiple

More information

Chapter 10 Web-based Information Systems

Chapter 10 Web-based Information Systems Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 10 Web-based Information Systems Role of the WWW for IS Initial

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 8. Internet Applications Internet Applications Overview Domain Name Service (DNS) Electronic Mail File Transfer Protocol (FTP) WWW and HTTP Content

More information

PeopleSoft Internet Architecture

PeopleSoft Internet Architecture PeopleSoft Internet Architecture AN OPEN ARCHITECTURE FOR INTERNET ACCESS AND INTEGRATION 3 ( 2 3 / (6 2 ) 7 Ã3 2 6, 7, 2 1 Ã3 $ 3 ( 5 - $ 1 8 $ 5 < Ã 3 (23/(6 2)7Ã, 17(51(7Ã$ 5&+,7(&785( - $18$5

More information

Oracle9i Application Server Architecture and Com

Oracle9i Application Server Architecture and Com Oracle9i Application Server Quick Tour: Architecture Page 1 de 7 Oracle9i Application Server Architecture and Com Standard Edition Enterprise Edition Wireless Edition Services and Components To provide

More information

5/11/2009. Better to light a candle than to curse the darkness. Case Study: Reconnaissance Leaks & Corporate Assets

5/11/2009. Better to light a candle than to curse the darkness. Case Study: Reconnaissance Leaks & Corporate Assets Spotlights on the Digital Battlefield Better to light a candle than to curse the darkness. Chinese Proverb Slide 2 Case Study: Reconnaissance Leaks & Corporate Assets Hacking is not always malicious Stealing

More information

SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security

SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security Consider 2. Based on DNS, identified the IP address of www.cuhk.edu.hk is 137.189.11.73. 1. Go to http://www.cuhk.edu.hk 3. Forward the

More information

Java Card Technology-based Corporate Card Solutions

Java Card Technology-based Corporate Card Solutions Java Card Technology-based Corporate Card Solutions Jack C. Pan, Leader and Sr. Architect Hervé Garcia, Tech. Project Manager econsumer Emerging Technologies, Citibank Overall Presentation Goal The objectives

More information

Extended Search Administration

Extended Search Administration IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 Note! Before using

More information

(9A05803) WEB SERVICES (ELECTIVE - III)

(9A05803) WEB SERVICES (ELECTIVE - III) 1 UNIT III (9A05803) WEB SERVICES (ELECTIVE - III) Web services Architecture: web services architecture and its characteristics, core building blocks of web services, standards and technologies available

More information

Borland AppServer. Borland

Borland AppServer. Borland Borland AppServer An Integrated Solution for Developing, Deploying, and Managing Distributed Multi-tier Applications. August 1998 Borland PAGE 1 Contents Introduction 4 Enterprises Shift to the Middle-tier

More information

BEAWebLogic. Portal. Overview

BEAWebLogic. Portal. Overview BEAWebLogic Portal Overview Version 10.2 Revised: February 2008 Contents About the BEA WebLogic Portal Documentation Introduction to WebLogic Portal Portal Concepts.........................................................2-2

More information

Configuring Request Authentication and Authorization

Configuring Request Authentication and Authorization CHAPTER 15 Configuring Request Authentication and Authorization Request authentication and authorization is a means to manage employee use of the Internet and restrict access to online content. This chapter

More information

HOMELESS INDIVIDUALS AND FAMILIES INFORMATION SYSTEM HIFIS 4.0 TECHNICAL ARCHITECTURE AND DEPLOYMENT REFERENCE

HOMELESS INDIVIDUALS AND FAMILIES INFORMATION SYSTEM HIFIS 4.0 TECHNICAL ARCHITECTURE AND DEPLOYMENT REFERENCE HOMELESS INDIVIDUALS AND FAMILIES INFORMATION SYSTEM HIFIS 4.0 TECHNICAL ARCHITECTURE AND DEPLOYMENT REFERENCE HIFIS Development Team May 16, 2014 Contents INTRODUCTION... 2 HIFIS 4 SYSTEM DESIGN... 3

More information

EPiServer Portals. Abstract

EPiServer Portals. Abstract EPiServer Portals Abstract This white paper outlines EPiServer's portal functionality. The document includes a high-level description of Web Services for Remote Portlets (WSRP) technology. Product version:

More information

X100 ARCHITECTURE REFERENCES:

X100 ARCHITECTURE REFERENCES: UNION SYSTEMS GLOBAL This guide is designed to provide you with an highlevel overview of some of the key points of the Oracle Fusion Middleware Forms Services architecture, a component of the Oracle Fusion

More information

Appeon Installation Guide for WebSphere

Appeon Installation Guide for WebSphere Appeon Installation Guide for WebSphere Appeon 6.5 for PowerBuilder WINDOWS DOCUMENT ID: DC00809-01-0650-01 LAST REVISED: November 2010 Copyright 2010 by Appeon Corporation. All rights reserved. This publication

More information

Adapter for Mainframe

Adapter for Mainframe BEA WebLogic Java Adapter for Mainframe Introduction Release 5.1 Document Date: August 2002 Copyright Copyright 2002 BEA Systems, Inc. All Rights Reserved. Restricted Rights Legend This software and documentation

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure

More information

Oracle Application Express: Administration 1-2

Oracle Application Express: Administration 1-2 Oracle Application Express: Administration 1-2 The suggested course agenda is displayed in the slide. Each lesson, except the Course Overview, will be followed by practice time. Oracle Application Express:

More information

unisys Internet Commerce Enabler Technical Overview imagine it. done. Release 11.1 October

unisys Internet Commerce Enabler Technical Overview imagine it. done. Release 11.1 October unisys imagine it. done. Internet Commerce Enabler Technical Overview Release 11.1 October 2010 7850 2473 004 NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THIS DOCUMENT. Any product or related information

More information

Business White Paper IDENTITY AND SECURITY. Access Manager. Novell. Comprehensive Access Management for the Enterprise

Business White Paper IDENTITY AND SECURITY.  Access Manager. Novell. Comprehensive Access Management for the Enterprise Business White Paper IDENTITY AND SECURITY Novell Access Manager Comprehensive Access Management for the Enterprise Simple, Secure Access to Network Resources Business Driver 1: Cost Novell Access Manager

More information

What we need. Agenda. What s J2EE. Challenges of Enterprise Application Development

What we need. Agenda. What s J2EE. Challenges of Enterprise Application Development Agenda.NET versus J2EE Felicia cheng Jarred zheng Jonathan Card Peng Li iao he Background Introduction J2EE Structure.NET Structure J2EE vs..net Conclusions Today s Enterprise Environment Challenges of

More information

Accessing the Ministry Secure File Delivery Service (SFDS)

Accessing the Ministry Secure File Delivery Service (SFDS) Ministry of Health Services Accessing the Ministry Secure File Delivery Service (SFDS) A Guide for New Users To SFDS And Digital Certificate Installation May 2004 Preface Purpose Audience Structure This

More information

Open XML Gateway User Guide. CORISECIO GmbH - Uhlandstr Darmstadt - Germany -

Open XML Gateway User Guide. CORISECIO GmbH - Uhlandstr Darmstadt - Germany - Open XML Gateway User Guide Conventions Typographic representation: Screen text and KEYPAD Texts appearing on the screen, key pads like e.g. system messages, menu titles, - texts, or buttons are displayed

More information

Vision of J2EE. Why J2EE? Need for. J2EE Suite. J2EE Based Distributed Application Architecture Overview. Umair Javed 1

Vision of J2EE. Why J2EE? Need for. J2EE Suite. J2EE Based Distributed Application Architecture Overview. Umair Javed 1 Umair Javed 2004 J2EE Based Distributed Application Architecture Overview Lecture - 2 Distributed Software Systems Development Why J2EE? Vision of J2EE An open standard Umbrella for anything Java-related

More information

In the most general sense, a server is a program that provides information

In the most general sense, a server is a program that provides information d524720 Ch01.qxd 5/20/03 8:37 AM Page 9 Chapter 1 Introducing Application Servers In This Chapter Understanding the role of application servers Meeting the J2EE family of technologies Outlining the major

More information

Java- EE Web Application Development with Enterprise JavaBeans and Web Services

Java- EE Web Application Development with Enterprise JavaBeans and Web Services Java- EE Web Application Development with Enterprise JavaBeans and Web Services Duration:60 HOURS Price: INR 8000 SAVE NOW! INR 7000 until December 1, 2011 Students Will Learn How to write Session, Message-Driven

More information

PLATFORM TECHNOLOGY UNIT-5

PLATFORM TECHNOLOGY UNIT-5 1. Write in brief about the J2EE enterprise edition? Java is one of the most commonly used and mature programming languages for building enterprise applications. Java development has evolved from small

More information

Distributed Multitiered Application

Distributed Multitiered Application Distributed Multitiered Application Java EE platform uses a distributed multitiered application model for enterprise applications. Logic is divided into components https://docs.oracle.com/javaee/7/tutorial/overview004.htm

More information

IBM. Security Digital Certificate Manager. IBM i 7.1

IBM. Security Digital Certificate Manager. IBM i 7.1 IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in

More information

Integrated Access Management Solutions. Access Televentures

Integrated Access Management Solutions. Access Televentures Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1

More information

Components and Application Frameworks

Components and Application Frameworks CHAPTER 1 Components and Application Frameworks 1.1 INTRODUCTION Welcome, I would like to introduce myself, and discuss the explorations that I would like to take you on in this book. I am a software developer,

More information

Web as a Distributed System

Web as a Distributed System Web as a Distributed System The World Wide Web is a large distributed system. In 1998 comprises 70-75% of Internet traffic. With large transfers of streaming media and p2p, no longer a majority of bytes,

More information

To find a quick and easy route to web-enable

To find a quick and easy route to web-enable BY JIM LEINBACH This article, the first in a two-part series, examines IBM s CICS Web Support (CWS) and provides one software developer s perspective on the strengths of CWS, the challenges his site encountered

More information

Web, HTTP and Web Caching

Web, HTTP and Web Caching Web, HTTP and Web Caching 1 HTTP overview HTTP: hypertext transfer protocol Web s application layer protocol client/ model client: browser that requests, receives, displays Web objects : Web sends objects

More information

X-S Framework Leveraging XML on Servlet Technology

X-S Framework Leveraging XML on Servlet Technology X-S Framework Leveraging XML on Servlet Technology Rajesh Kumar R Abstract This paper talks about a XML based web application framework that is based on Java Servlet Technology. This framework leverages

More information

Web Programming Paper Solution (Chapter wise)

Web Programming Paper Solution (Chapter wise) Introduction to web technology Three tier/ n-tier architecture of web multitier architecture (often referred to as n-tier architecture) is a client server architecture in which presentation, application

More information

Course 834 EC-Council Certified Secure Programmer Java (ECSP)

Course 834 EC-Council Certified Secure Programmer Java (ECSP) Course 834 EC-Council Certified Secure Programmer Java (ECSP) Duration: 3 days You Will Learn How To Apply Java security principles and secure coding practices Java Security Platform, Sandbox, JVM, Class

More information

13. Databases on the Web

13. Databases on the Web 13. Databases on the Web Requirements for Web-DBMS Integration The ability to access valuable corporate data in a secure manner Support for session and application-based authentication The ability to interface

More information

1-1. Switching Networks (Fall 2010) EE 586 Communication and. September Lecture 10

1-1. Switching Networks (Fall 2010) EE 586 Communication and. September Lecture 10 EE 586 Communication and Switching Networks (Fall 2010) Lecture 10 September 17 2010 1-1 Announcement Send me your group and get group ID HW3 (short) out on Monday Personal leave for next two weeks No

More information

SAS. Installation Guide Fifth Edition Intelligence Platform

SAS. Installation Guide Fifth Edition Intelligence Platform SAS Installation Guide Fifth Edition 9.1.3 Intelligence Platform The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2006. SAS 9.1.3 Intelligence Platform: Installation

More information

Introducing Cisco Unified MeetingPlace Web Conferencing

Introducing Cisco Unified MeetingPlace Web Conferencing CHAPTER 1 Introducing Cisco Unified MeetingPlace Web Conferencing This chapter contains the following sections: About Cisco Unified MeetingPlace, page 1-1 About Cisco Unified MeetingPlace Web Conferencing,

More information

Web Engineering (CC 552)

Web Engineering (CC 552) Web Engineering (CC 552) Introduction Dr. Mohamed Magdy mohamedmagdy@gmail.com Room 405 (CCIT) Course Goals n A general understanding of the fundamentals of the Internet programming n Knowledge and experience

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

How to work with HTTP requests and responses

How to work with HTTP requests and responses How a web server processes static web pages Chapter 18 How to work with HTTP requests and responses How a web server processes dynamic web pages Slide 1 Slide 2 The components of a servlet/jsp application

More information

Connecting to System i System i Access for Web

Connecting to System i System i Access for Web System i Connecting to System i System i Access for Web Version 6 Release 1 System i Connecting to System i System i Access for Web Version 6 Release 1 Note Before using this information and the product

More information

Recommendations for Web Development and Deployment Using Team Developer

Recommendations for Web Development and Deployment Using Team Developer Recommendations for Web Development and Deployment Using Team Developer By Kumuthini Ragavan Senior Technical Consultant Gupta Technologies, LLC 975 Island Drive Redwood Shores, CA 94065 USA Phone +1-650-596-3400

More information

FUSION REGISTRY COMMUNITY EDITION SETUP GUIDE VERSION 9. Setup Guide. This guide explains how to install and configure the Fusion Registry.

FUSION REGISTRY COMMUNITY EDITION SETUP GUIDE VERSION 9. Setup Guide. This guide explains how to install and configure the Fusion Registry. FUSION REGISTRY COMMUNITY EDITION VERSION 9 Setup Guide This guide explains how to install and configure the Fusion Registry. FUSION REGISTRY COMMUNITY EDITION SETUP GUIDE Fusion Registry: 9.2.x Document

More information

Customizing a Packaged Application for a J2EE Environment: A Case Study. Leslie Tierstein TopTier Consulting, Inc.

Customizing a Packaged Application for a J2EE Environment: A Case Study. Leslie Tierstein TopTier Consulting, Inc. Customizing a Packaged Application for a J2EE Environment: A Case Study Leslie Tierstein TopTier Consulting, Inc. 1 Overview (1) Learning experiences in a J2EE Environment The environment Deployment of

More information

Oracle Communications Services Gatekeeper

Oracle Communications Services Gatekeeper Oracle Communications Services Gatekeeper Security Guide Release 5.1 E36134-01 June 2013 Oracle Communications Services Gatekeeper Security Guide, Release 5.1 E36134-01 Copyright 2011, 2013, Oracle and/or

More information

Novell Access Manager 3.1

Novell Access Manager 3.1 Technical White Paper IDENTITY AND SECURITY www.novell.com Novell Access Manager 3.1 Access Control, Policy Management and Compliance Assurance Novell Access Manager 3.1 Table of Contents: 2..... Complete

More information

Notes. Submit homework on Blackboard The first homework deadline is the end of Sunday, Feb 11 th. Final slides have 'Spring 2018' in chapter title

Notes. Submit homework on Blackboard The first homework deadline is the end of Sunday, Feb 11 th. Final slides have 'Spring 2018' in chapter title Notes Ask course content questions on Slack (is651-spring-2018.slack.com) Contact me by email to add you to Slack Make sure you checked Additional Links at homework page before you ask In-class discussion

More information

Web Serving Architectures

Web Serving Architectures Web Serving Architectures Paul Dantzig IBM Global Services 2000 without the express written consent of the IBM Corporation is prohibited Contents Defining the Problem e-business Solutions e-business Architectures

More information

CA Adapter. CA Adapter Installation Guide for Windows 8.0

CA Adapter. CA Adapter Installation Guide for Windows 8.0 CA Adapter CA Adapter Installation Guide for Windows 8.0 This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the Documentation

More information

WSRP Web Services for Remote Portlets

WSRP Web Services for Remote Portlets WSRP Web Services for Remote Portlets Dave Landers WebLogic Portal Architect BEA Systems, Inc. Session Goals Basic WSRP description Outline of protocol Why / when WSRP is useful Developer best practices

More information

Configuring Content Authentication and Authorization on Standalone Content Engines

Configuring Content Authentication and Authorization on Standalone Content Engines CHAPTER 10 Configuring Content Authentication and Authorization on Standalone Content Engines This chapter describes how to configure content authentication and authorization on standalone Content Engines

More information

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Applying Application Delivery Technology to Web Services Overview The Cisco ACE XML Gateway is the newest

More information

OpenIAM Identity and Access Manager Technical Architecture Overview

OpenIAM Identity and Access Manager Technical Architecture Overview OpenIAM Identity and Access Manager Technical Architecture Overview Overview... 3 Architecture... 3 Common Use Case Description... 3 Identity and Access Middleware... 5 Enterprise Service Bus (ESB)...

More information

Active Server Pages Architecture

Active Server Pages Architecture Active Server Pages Architecture Li Yi South Bank University Contents 1. Introduction... 2 1.1 Host-based databases... 2 1.2 Client/server databases... 2 1.3 Web databases... 3 2. Active Server Pages...

More information

Radius, LDAP, Radius, Kerberos used in Authenticating Users

Radius, LDAP, Radius, Kerberos used in Authenticating Users CSCD 303 Lecture 5 Fall 2018 Radius, LDAP, Radius, Kerberos used in Authenticating Users Kerberos Authentication and Authorization Previously Said that identification, authentication and authorization

More information

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved. Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure

More information

Review of Previous Lecture

Review of Previous Lecture Review of Previous Lecture Network access and physical media Internet structure and ISPs Delay & loss in packet-switched networks Protocol layers, service models Some slides are in courtesy of J. Kurose

More information

INTRODUCTION TO Object Oriented Systems BHUSHAN JADHAV

INTRODUCTION TO Object Oriented Systems BHUSHAN JADHAV INTRODUCTION TO Object Oriented Systems 1 CHAPTER 1 Introduction to Object Oriented Systems Preview of Object-orientation. Concept of distributed object systems, Reasons to distribute for centralized objects.

More information

Crystal Enterprise. Overview. Contents. Web Server Overview - Internet Information System (IIS)

Crystal Enterprise. Overview. Contents. Web Server Overview - Internet Information System (IIS) Overview Contents This document provides an overview to web server technology particularly Microsoft s Internet Information Server (IIS) and its relationship with. Although this article has been written

More information

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

key distribution requirements for public key algorithms asymmetric (or public) key algorithms topics: cis3.2 electronic commerce 24 april 2006 lecture # 22 internet security (part 2) finish from last time: symmetric (single key) and asymmetric (public key) methods different cryptographic systems

More information

Oracle 10g: Build J2EE Applications

Oracle 10g: Build J2EE Applications Oracle University Contact Us: (09) 5494 1551 Oracle 10g: Build J2EE Applications Duration: 5 Days What you will learn Leading companies are tackling the complexity of their application and IT environments

More information

Application Design and Development: October 30

Application Design and Development: October 30 M149: Database Systems Winter 2018 Lecturer: Panagiotis Liakos Application Design and Development: October 30 1 Applications Programs and User Interfaces very few people use a query language to interact

More information

e-commerce Study Guide Test 2. Security Chapter 10

e-commerce Study Guide Test 2. Security Chapter 10 e-commerce Study Guide Test 2. Security Chapter 10 True/False Indicate whether the sentence or statement is true or false. 1. Necessity refers to preventing data delays or denials (removal) within the

More information

CMSC 332 Computer Networking Web and FTP

CMSC 332 Computer Networking Web and FTP CMSC 332 Computer Networking Web and FTP Professor Szajda CMSC 332: Computer Networks Project The first project has been posted on the website. Check the web page for the link! Due 2/2! Enter strings into

More information

Enterprise Java Unit 1-Chapter 2 Prof. Sujata Rizal Java EE 6 Architecture, Server and Containers

Enterprise Java Unit 1-Chapter 2 Prof. Sujata Rizal Java EE 6 Architecture, Server and Containers 1. Introduction Applications are developed to support their business operations. They take data as input; process the data based on business rules and provides data or information as output. Based on this,

More information

HP Instant Support Enterprise Edition (ISEE) Security overview

HP Instant Support Enterprise Edition (ISEE) Security overview HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained

More information

Developing Java TM 2 Platform, Enterprise Edition (J2EE TM ) Compatible Applications Roles-based Training for Rapid Implementation

Developing Java TM 2 Platform, Enterprise Edition (J2EE TM ) Compatible Applications Roles-based Training for Rapid Implementation Developing Java TM 2 Platform, Enterprise Edition (J2EE TM ) Compatible Applications Roles-based Training for Rapid Implementation By the Sun Educational Services Java Technology Team January, 2001 Copyright

More information

BEA AquaLogic. Enterprise Security. Glossary

BEA AquaLogic. Enterprise Security. Glossary BEA AquaLogic Enterprise Security Glossary Verson: 3.0 Revised: December 2007 Contents Glossary 1 AAA 1 access control 1 access decision 1 accountability 1 adjudication provider 2 administration console

More information

the Corba/Java Firewall

the Corba/Java Firewall Firewall Security for Corba and J2EE/EJB with the IIOP Domain Boundary Controller Corba and Java-RMI based applications can be directly and securely made accessible to users outside the internal network,

More information

Lecture 6 Application Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 Application Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 Application Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Application-layer protocols Application: communicating, distributed processes running in network hosts

More information

Client/Server-Architecture

Client/Server-Architecture Client/Server-Architecture Content Client/Server Beginnings 2-Tier, 3-Tier, and N-Tier Architectures Communication between Tiers The Power of Distributed Objects Managing Distributed Systems The State

More information

Appeon Installation Guide for WebLogic

Appeon Installation Guide for WebLogic Appeon Installation Guide for WebLogic Appeon 6.2 for PowerBuilder WINDOWS DOCUMENT ID: DC00807-01-0620-02 LAST REVISED: July 2009 Copyright 2009 by Appeon Corporation. All rights reserved. This publication

More information

Inside WebSphere Application Server

Inside WebSphere Application Server Inside WebSphere Application Server The anatomy of WebSphere Application Server is quite detailed so, for now, let's briefly outline some of the more important parts. The following diagram shows the basic

More information

IBM SecureWay On-Demand Server Version 2.0

IBM SecureWay On-Demand Server Version 2.0 Securely delivering personalized Web applications IBM On-Demand Server Version 2.0 Highlights Delivers personalized Web solutions on demand to anyone, anywhere using profile serving Provides industry-leading,

More information

Traditional Web Based Systems

Traditional Web Based Systems Chapter 12 Distributed Web Based Systems 1 Traditional Web Based Systems The Web is a huge distributed system consisting of millions of clients and servers for accessing linked documents Servers maintain

More information

Glossary of Technical Terms

Glossary of Technical Terms Glossary of Technical Terms National Association of REALTORS Center for REALTOR Technology September 2003 Technical Terms Page 1 of 19 Glossary of Terms The following terms relate to technology are defined

More information

IBM i Version 7.2. Security Digital Certificate Manager IBM

IBM i Version 7.2. Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information

More information

Enhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation

Enhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation Enhancing cloud applications by using external authentication services After you complete this section, you should understand: Terminology such as authentication, identity, and ID token The benefits of

More information

DreamFactory Security Guide

DreamFactory Security Guide DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit

More information

VST Hospital Administrator Guide. Version 2.0.4

VST Hospital Administrator Guide. Version 2.0.4 VST Hospital Administrator Guide Version 2.0.4 Notice Copyright 2002- Vocera Communications, Inc. All rights reserved. Vocera is a registered trademark of Vocera Communications, Inc. This software is licensed,

More information

Introduction to Worklight Integration IBM Corporation

Introduction to Worklight Integration IBM Corporation Introduction to Worklight Integration Agenda IBM Mobile Foundation Introduction to Worklight How to Integrate Worklight Adapters WebAPI HTTP & SOAP Database (SQL) WebSphere Message Broker Cast Iron 2 IBM

More information

Outline. Project Goal. Overview of J2EE. J2EE Architecture. J2EE Container. San H. Aung 26 September, 2003

Outline. Project Goal. Overview of J2EE. J2EE Architecture. J2EE Container. San H. Aung 26 September, 2003 Outline Web-based Distributed EJB BugsTracker www.cs.rit.edu/~sha5239/msproject San H. Aung 26 September, 2003 Project Goal Overview of J2EE Overview of EJBs and its construct Overview of Struts Framework

More information

Lotus Learning Management System R1

Lotus Learning Management System R1 Lotus Learning Management System R1 Version 1.0.4 March 2004 Administrator's Guide G210-1785-00 Contents Chapter 1 Introduction to the Learning Management System and Administration...1 Understanding the

More information

The Internet Advanced Research Projects Agency Network (ARPANET) How the Internet Works Transport Control Protocol (TCP)

The Internet Advanced Research Projects Agency Network (ARPANET) How the Internet Works Transport Control Protocol (TCP) The Internet, Intranets, and Extranets 1 The Internet The Internet is a collection of interconnected network of computers, all freely exchanging information. These computers use specialized software to

More information

Magnolia Community Edition vs. Enterprise Edition. Non-Functional Features. Magnolia EE. Magnolia CE. Topic. Good value for money.

Magnolia Community Edition vs. Enterprise Edition. Non-Functional Features. Magnolia EE. Magnolia CE. Topic. Good value for money. Community Edition vs. Enterprise Edition Non-Functional Features Good value for money Enterprise Edition is based on an Open Source business model that minimizes sales effort and cost without sacrificing

More information

WHITE PAPER. Good Mobile Intranet Technical Overview

WHITE PAPER. Good Mobile Intranet Technical Overview WHITE PAPER Good Mobile Intranet CONTENTS 1 Introduction 4 Security Infrastructure 6 Push 7 Transformations 8 Differential Data 8 Good Mobile Intranet Server Management Introduction Good Mobile Intranet

More information

1.1 A Brief Intro to the Internet

1.1 A Brief Intro to the Internet 1.1 A Brief Intro to the Internet - Origins - ARPAnet - late 1960s and early 1970s - Network reliability - For ARPA-funded research organizations - BITnet, CSnet - late 1970s & early 1980s - email and

More information

Java Enterprise Edition

Java Enterprise Edition Java Enterprise Edition The Big Problem Enterprise Architecture: Critical, large-scale systems Performance Millions of requests per day Concurrency Thousands of users Transactions Large amounts of data

More information

BEA WebLogic Server Integration Guide

BEA WebLogic Server Integration Guide IBM Tivoli Access Manager for e-business BEA WebLogic Server Integration Guide Version 5.1 SC32-1366-00 IBM Tivoli Access Manager for e-business BEA WebLogic Server Integration Guide Version 5.1 SC32-1366-00

More information