Secure thread collaboration across protection domains

When threads collaborate across protection domains, they introduce interesting wrinkles into the science of building secure applications. This month, Todd Sundsted presents these scenarios and shows how to use the AccessControlContext...

12/15/00

Signed and sealed objects deliver secure serialized content

With the Java serialization mechanism, you can transport Java objects from one Java VM to another and place Java objects in persistent storage. It does not protect the serialized content, however, and thus introduces the possibility...

11/17/00

Alternative deployment methods, Part 3: The code

In Part 3 of his series on application deployment, Todd Sundsted looks at the code that supports the deployment tool he described in Part 2. This article explains the framework's operation, highlights its design features, and explores...

09/22/00

Alternative deployment methods, Part 2: The best of both worlds

Despite a history of black eyes and a reputation for being difficult to work with, Java applets are still the dominant client-side Java application-deployment technique in enterprise environments. Unfortunately, they are often not the...

07/14/00

Alternative deployment methods, Part 1: Beyond applets

When the issue of application deployment arises, developers typically consider the possibility of deployment as an applet. Often, this is not the correct approach. This month, Todd Sundsted begins an exploration of deployment...

05/12/00

JNDI overview, Part 3: Advanced JNDI

A JNDI service can be much more than a computerized card catalog. JNDI's object-storage capabilities allow it to play the role of resource administrator in your distributed applications and to provide simple, manageable object...

03/01/00

JNDI overview, Part 2: An introduction to directory services

As applications become more distributed, the efficient management and distribution of the information upon which they depend becomes more and more of a problem. Directory services such as LDAP (the Lightweight Directory Access...

02/21/00

XML and Java: A potent partnership, Part 4

In this final installment of his four-part series on XML and Java, Todd Sundsted completes his integration of JavaScript and Java and brings the ease-of-use and flexibility of a scripting language to his XML framework. (2,200 words)

09/20/99

XML and Java: A potent partnership, Part 3

Nothing beats a scripting language when it comes to application flexibility and programmer productivity. This month, Todd Sundsted demonstrates how to integrate Java and JavaScript, both popular programming languages in their own...

08/20/99

XML and Java: A potent partnership, Part 2

One of XML's advantages over HTML is its extensibility. This feature makes it possible to use XML to describe information in ways that would be impossible with HTML. This month, Todd demonstrates how to build a framework for...

07/24/99

XML and Java: A potent partnership, Part 1

XML (Extensible Markup Language) began life as a "new and improved" HTML. It has since found a place not only on the Web but also in the enterprise. This month, Todd examines one aspect of XML's role in the enterprise: enterprise...

06/09/99

Messaging makes its move, Part 2

This month Todd completes the quest he began last month by putting the finishing touches on an implementation of the Java Message Service Specification written entirely in the Java programming language. You'll learn how to use the...

03/01/99

Messaging makes its move, Part 1

Messaging products have found their niche within enterprise applications as tools for coordinating distributed application components. What they do is remove the responsibility for ensuring messages are delivered reliably and...

02/01/99

In Java we trust

The Java Security API makes it a simple matter to add security and authentication to your application. The result is an application that knows what and whom it can trust. This month, Todd delves into the Java Security API and...

01/26/99

Signed and delivered: An introduction to security and authentication

Whether information arrives as applet or agent, e-mail or e-check, you can ultimately believe its claims, assess its value, or trust its promises only to the extent that you can trust every hand that it passed through. This is the...

12/01/98

Zip your data and improve the performance of your network-based applications

Network-centric applications written in Java seem to grow more commonplace with each passing month. Because the overall performance of these applications is often limited by the volume of data they must pass through the network, it...

11/01/98

Agents can think, too!

Despite the hype that often surrounds intelligent agents, there are very good, very practical reasons why agents (especially mobile agents) should be a bit more intelligent than your average piece of software. This month, Todd...

10/01/98

Agents talking to agents

No matter what a particular agent architecture provides, the one ever-present feature is support for agent communication. This is true because agents, by themselves, aren't very powerful. It's only by working together with other...

09/01/98

Agents on the move

Mobile agents, the touring members of the agent clan, have as their defining trait the ability to pack their bags and move on. They needn't use this freedom for frivolous purposes, however. Their mobility allows them to overcome...

07/01/98

An introduction to agents

Agents draw on and integrate many diverse disciplines of computer science, and although agent technology has not yet hit prime time, it is gathering its share of investment money. Find out what all the uproar is about in this month's...

06/01/98

Load More