Java vs. .NET Security
- 0 %
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

Java vs. .NET Security

 PDF
Sofort lieferbar | Lieferzeit: Sofort lieferbar I
ISBN-13:
9780596008215
Veröffentl:
2004
Einband:
PDF
Seiten:
80
Autor:
Denis Piliptchouk
eBook Typ:
PDF
eBook Format:
PDF
Kopierschutz:
NO DRM
Sprache:
Englisch
Beschreibung:

This document reviews security features of two most popular modern development platforms--Java and .NET (Java v1.4.2/J2EE v1.4 and .NET v1.1). The platform choice is not random, because they represent, to a certain extent, competition between UNIX-like and Windows systems, which largely defined software evolution over the last decade. Although Java applications run on Windows, and there exist UNIX bridges for .NET, the Java/UNIX and .NET/Windows combinations are used for development of a significant portion (if not majority) of applications on their respective operating systems, so both platforms deserve a careful examination of their capabilities.Such an examination is especially important since different aspects of UNIX/Windows and Java/.NET competition have been flaming endless heated debates between proponents of both camps, which often blindly deny merits of the opposite side while at the same time praising their preferred solution. The material here is purposely structured by general categories of protection mechanism and reviewing each platform$B!G(Bs features in those areas. This allows starting each topic with a platform-neutral security concept and performing relatively deep drill-downs for each technology without losing track of the overall focus of providing an unbiased side-by-side comparison.The document is based on the research material that was used as a foundation of the feature article, "e;Securing .NET and Enterprise Java: Side by Side"e;, which was written by Vincent Dovydaitis and myself and appeared in Numbers 3-4 of Computer Security Journal in 2002. The following areas will be considered:Security Configuration and Code ContainmentCryptography and CommunicationCode Protection and Code Access Security, or CASAuthentication and User Access Security, or UAS
This document reviews security features of two most popular modern development platforms--Java and .NET (Java v1.4.2/J2EE v1.4 and .NET v1.1). The platform choice is not random, because they represent, to a certain extent, competition between UNIX-like and Windows systems, which largely defined software evolution over the last decade. Although Java applications run on Windows, and there exist UNIX bridges for .NET, the Java/UNIX and .NET/Windows combinations are used for development of a significant portion (if not majority) of applications on their respective operating systems, so both platforms deserve a careful examination of their capabilities.Such an examination is especially important since different aspects of UNIX/Windows and Java/.NET competition have been flaming endless heated debates between proponents of both camps, which often blindly deny merits of the opposite side while at the same time praising their preferred solution. The material here is purposely structured by general categories of protection mechanism and reviewing each platform$B!G(Bs features in those areas. This allows starting each topic with a platform-neutral security concept and performing relatively deep drill-downs for each technology without losing track of the overall focus of providing an unbiased side-by-side comparison.The document is based on the research material that was used as a foundation of the feature article, "e;Securing .NET and Enterprise Java: Side by Side"e;, which was written by Vincent Dovydaitis and myself and appeared in Numbers 3-4 of Computer Security Journal in 2002. The following areas will be considered:Security Configuration and Code ContainmentCryptography and CommunicationCode Protection and Code Access Security, or CASAuthentication and User Access Security, or UAS

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.