http://i.pdfchm.net/6/3/3566/60/core-security-patterns-best-practices-and-strategies-for-j2ee-tm-web-services-and-identity-management.jpg