03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

11<br />

Chapter 11.<br />

<strong>Security</strong> in Patterns for<br />

e-business<br />

This chapter discusses the security considerations for end-to-end solutions in the<br />

context of the Patterns for e-business.<br />

First a very short introduction to Patterns for e-business is given, describing what<br />

patterns are used in what solution development stages. Then, based on the<br />

ITSOBank sample application a high level solution design life cycle is presented<br />

based on selected patterns. All assumptions and decision drivers have been<br />

documented at each design stage.<br />

At the end of the chapter, a final system architecture is proposed as a result of<br />

the process.<br />

© Copyright <strong>IBM</strong> Corp. 2002 349

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!