Friday, March 1, 2013

Securing Jafar - An Architectural Framework For E-

Securing JAFAR - An Architectural Framework for E-Commerce Applications
by Nicolas Guelfi, Cédric Pruski, Jan Reimen and Paul Sterges

--------------------------------------------------------------------------------

security measures measure is the key to the advantage of e-commerce applications. In the context of the FIDJI project, the Software technology Competence Center (SE2C) at the University of Luxembourg has developed JAFAR, a J2EE (Java 2 Platform, Enterprise Edition) architectural framework for the development of control e-commerce applications. Research is now focusing on the various security problems that are directly linked to the lend oneself and development of much(prenominal) applications.

Since the early nineties and the advent of distributed e-commerce, computer science has been confronted with problems associate to security, in both the exchange and server-side handling of information. The key to success for e-commerce applications resides in gaining the trust of potential rehearsers. Applications must therefore be developed in order to offer adequate levels of security. The ADS (Architecture technology for Dependable Distributed Systems) team of the SE2C is interested in three major problems relating to security and trust management in the development and use of distributed e-commerce applications.

Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.




Architecture of JAFAR.


First, in the eyes of users, data confidentiality during an exchange amidst the client application and the server constitutes the most critical pinnacle of security. This phenomenon, which remains purely a network problem, increased in importance with the arrival of third-generation telecommunications networks and the appearance of the mobile commerce (m-commerce) paradigm. The use of an architectural framework such as JAFAR allows the developers of distributed applications to take into tale and to more easily solve, at the software level, this problem of data exchange. This is managed in particular through the use of security solutions already...If you need to get a full essay, order it on our website: Orderessay



If you want to get a full essay, wisit our page: write my essay .

No comments:

Post a Comment