Servlet's are very quick. You should try it. Performance is not noticeably downgraded either. Look into it. This is why I say that Java is starting to come of age.
From the Javasoft site at java.sun.com
Our Office product when used over the public Internet is more secure than MSFT Office when used over a private Intranet, and the servers will have much more physical protection than any average consumer can provide.
What Does the Java Security API Provide?
The Java Security API is a new Java core API, built around the java.security package (and its subpackages).
The first release of the Java Security API, available in JDK 1.1, contains APIs for:
Digital Signatures Digital signature algorithms, such as DSA (Digital Signature Algorithm). The functionality includes generating public/private key pairs as well as signing and verifying arbitrary digital data.
Message Digests Cryptographically secure message digests, such as MD5 and SHA-1. These algorithms, also called one-way hash algorithms, are useful for producing "digital fingerprints" of data, which are frequently used in digital signatures and other applications that need unique and unforgeable identifiers for digital data.
Key Management A set of abstractions for managing principals (entities such as individual users or groups), their keys, and their certificates. It allows applications to design their own key management systems, and to interoperate with other systems at a high level. Note that support for specific certificate formats is not available but will be part of a future JDK release.
The cryptography framework in the Java Security API is designed so that a new algorithm can be added later on without much difficulty and can be utilized in the same fashion as existing algorithms. For example, although DSA is the only built-in digital signature algorithm in this release, the framework can easily accommodate another algorithm such as RSA. Vendors can develop their own algorithms and integrate their resulting provider) packages into the Java Security API so that clients can utilize them. |