A core concept that underlies the architecture involves crosscutting concerns. A "concern" is any concept related to the system. For example, in a banking application, crediting and debiting customer ...
No matter how big your company is or what it does, security is a primary consideration when choosing a Web service for all applications. This first in a series of three articles describes the 10 most ...
Web Services play a key role in implementing Service Oriented Architecture (SOA). The notion of describing the service independent of the technology in which it has been implemented has been robustly ...
XML is a wonderful advancement in data formatting, but it provides no inherent security. There are various XML security techniques, and this article provides a summary and comparison of the most ...
When leafing through the pages of the recently ratified JSR-375, the new Java EE Security API, it's amusing how quickly the reading of the spec turns into an exercise of uttering to yourself, ...
Microsoft has been providing tools for building Web services since it released the initial version of Visual Studio.NET in 2000. As with many Microsoft technology releases, the initial implementation ...
Service-oriented architecture (SOA) emerged in the early part of this century as an evolution of distributed computing. Before SOA, services were understood as the end result of the application ...
Eighteen months ago "Web services security" was still seen as an oxymoron. One of the principal reasons was that "Web services" was still largely understood as meaning "services on the Web." A CFO ...
Java is a popular computing platform, but lately, Java is blamed for its security vulnerabilities. It is recommended by many to disable or completely uninstall Java. However, there are applications ...
No matter how big your company is or what it does, security is a primary consideration when choosing a Web service for all applications. This article will look at the 10 most important factors that ...