Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Авторы: Steel Ch., Nagappan R., Lai R.

Аннотация:

For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1088

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Protocols, Java System Access Manager      
Protocols, SAML      
Protocols, Security Services      
Provider classes
Provider classes, JCA
Provider classes, JCE      
Providers      
Providers, authorization      2nd
Providers, J2EE
Providers, JMS
Providers, JSSE
Providers, Liberty specifications      2nd
Providers, LoginModule      
Providers, PCKS      
Providers, Secure Message Router pattern      
Providers, session state maintenance      
Providers, Web services      2nd
Provisioning Service Points      2nd
Provisioning Service Targets      
Provisioning services      [See User account provisioning]
Proxies      
Proxies in Liberty specifications
Proxies, Secure Service Proxy pattern      [See Secure Service Proxy pattern]
Proxy pattern      2nd
Proxy tunneling      
PSTID-ID mapping tables
Public Accounting Board
Public credential set      
Public key infrastructure (PKI)      
Public Key Infrastructure (PKI) in Security Wheel      
Public Key Infrastructure (PKI), limitations
Public Key Infrastructure (PKI), Web tier patterns
Public Key Infrastructure (PKI), XML      
Public Key Interoperability Test Suite (PKITS)      
Public keys      
Public keys in assessment checklists
Public keys, LDAP      2nd
PublicKey interface
publishPasswordSyncResult method      
Qualitative risk analysis      
Quality of services      
Quality of services, reality checks      
Quality of services, security patterns
Quality of services, security patterns, factor analysis      
Quality of services, security patterns, security provisioning      
Quantitative risk analysis      
RA (risk analysis)      
Radio Frequency Identification (RFID)      
RAM      
RAM, for Secure Session Object pattern      
RAM, in smart cards      
random number generation      
Rationale in security design
RBAC profiles
RC6 algorithm
Reactive security
Readers
Readers, RFID
Readers, smart card      2nd
Reality checks      2nd
Reality checks for administration      
Reality checks for policies      
Reality checks for quality of services
Reality checks in security pattern templates
Reality checks in security pattern templates, Assertion Builder      
Reality checks in security pattern templates, Audit Interceptor      
Reality checks in security pattern templates, Authentication Enforcer
Reality checks in security pattern templates, Authorization Enforcer
Reality checks in security pattern templates, Container Managed Security
Reality checks in security pattern templates, Credential Tokenizer
Reality checks in security pattern templates, Dynamic Service Management      
Reality checks in security pattern templates, Intercepting Validator
Reality checks in security pattern templates, Intercepting Web Agent
Reality checks in security pattern templates, Message Inspector
Reality checks in security pattern templates, Message Interceptor Gateway      
Reality checks in security pattern templates, Obfuscated Transfer Object      
Reality checks in security pattern templates, Password Synchronizer
Reality checks in security pattern templates, Policy Delegate
Reality checks in security pattern templates, Secure Base Action
Reality checks in security pattern templates, Secure Logger
Reality checks in security pattern templates, Secure Message Router
Reality checks in security pattern templates, Secure Pipe
Reality checks in security pattern templates, Secure Service Facade      
Reality checks in security pattern templates, Secure Service Proxy
Reality checks in security pattern templates, Secure Session Object
Reality checks in security pattern templates, Single Sign-on Delegator
Reality checks, Business tier      
Reality checks, Client Device tier      
Reality checks, Integration tier
Reality checks, Presentation tier
Reality checks, Web tier
realms      
Realms for smart cards
Realms, J2EE      2nd
Realms, JAAS
Reconciliation in user account provisioning
Recovery      2nd
Recovery in case study
Recovery in use cases
Recovery in XKMS      
Recovery, key
Recovery, service
Redirection, web
Redundancy in Policy Delegate pattern
Refactoring security design
Reference templates for biometrics
registerObject method
Registration      
Registration, identity
Registration, UDDI      
registries
Registries, Dynamic Service Management pattern
registries, UDDI      
Registries, Web services
Registries, XACML
RegistryMonitor class
Regulatory policies      
Reissue service, key
REL (Rights Expression Language)
Related patterns in security pattern templates      2nd
Related patterns in security pattern templates, Assertion Builder      
Related patterns in security pattern templates, Audit Interceptor
Related patterns in security pattern templates, Authentication Enforcer
Related patterns in security pattern templates, Authorization Enforcer
Related patterns in security pattern templates, Container Managed Security      
Related patterns in security pattern templates, Credential Tokenizer
Related patterns in security pattern templates, Dynamic Service Management
Related patterns in security pattern templates, Intercepting Validator
Related patterns in security pattern templates, Intercepting Web Agent
Related patterns in security pattern templates, Message Inspector
Related patterns in security pattern templates, Message Interceptor Gateway      
Related patterns in security pattern templates, Obfuscated Transfer Object
Related patterns in security pattern templates, Password Synchronizer
Related patterns in security pattern templates, Policy Delegate
Related patterns in security pattern templates, Secure Base Action      
Related patterns in security pattern templates, Secure Logger
Related patterns in security pattern templates, Secure Message Router
Related patterns in security pattern templates, Secure Pipe
Related patterns in security pattern templates, Secure Service Facade      
Related patterns in security pattern templates, Secure Service Proxy      
Related patterns in security pattern templates, Secure Session Object      
Related patterns in security pattern templates, Single Sign-on Delegator
Relationships in Liberty Alliance
Reliability
Reliability, Assertion Builder pattern      
Reliability, Secure Message Router pattern      
reloadMBeans method
Remote interface and services      
Remote interface and services, Secure Service Facade pattern
Remote interface and services, Single Sign-on Delegator pattern
removeAssertionReply method
removeAssertionStatement method      
removeCompRef method
removeSessionInfo method
removeSSOTokenMap method
replay attacks      
Replay attacks, Intercepting Web Agent pattern
Replay attacks, SAML
Replay attacks, Web services
Replay attacks, XKMS
Reporting practices
Reporting practices, Gramm-Leach-Bliley Act      
Reporting practices, Sarbanes-Oxley Act
Reporting services in identity management
Repository
Repository for biometric information
Repository, SAML
Repository, XACML
request messages      
Request messages, Message Inspector pattern      2nd
Request messages, Secure Message Router pattern
Request-reply model
Request-reply model, SAML      
Request-reply model, SAML, attribute assertion      
Request-reply model, SAML, authentication assertions      
Request-reply model, SPML      
RequestContext class      
RequestContext class, Authentication Enforcer pattern      
RequestContext class, Authorization Enforcer pattern      
RequestContext class, JAAS Login Module Strategy      
Requesters for Web services
Requesting Authority      
RequestMessage class
Requests, XACML      
Required flag
Requirements      
Requirements in use cases      
Requirements, Secure UP      2nd
Requirements, security basics
Requisite flag      
Resource principals      
Resource profiles      
Resources tier
respond method      
Response APDUs
Response Message      
Response Message, Message Inspector pattern      
Response Message, Message Interceptor Gateway pattern
Retinal analysis      
reusability      
Reusability in security patterns      
Reusability in security patterns, Authorization Enforcer
Reusability in security patterns, Message Inspector      
Reusability in security patterns, Message Interceptor Gateway      
Reusability in security patterns, Secure Base Action
Reusability in security patterns, Secure Message Router
Reusability, Java components      
Reusability, password      
Reverse engineering Java code      
Revocation issues and services      
Revocation issues and services, LDAP      
Revocation issues and services, Single Sign-on Delegator pattern      
Revocation issues and services, X-KRSS      
Revoked smart cards      
RFID (Radio Frequency Identification)      
Rich-client authentication      
Rights Expression Language (REL)      
Rijndael algorithm      
RIPEMD-160 encryption algorithms      
Risk analysis (RA)      
Risk Analyzer      
risks      
Risks in case study      2nd
Risks in patterns-driven security design      
Risks in security patterns      
Risks in security patterns, Assertion Builder      
Risks in security patterns, Audit Interceptor      
Risks in security patterns, Authentication Enforcer      
Risks in security patterns, Authorization Enforcer      
Risks in security patterns, Container Managed Security      
Risks in security patterns, Credential Tokenizer      
Risks in security patterns, Dynamic Service Management      
Risks in security patterns, Intercepting Validator      
Risks in security patterns, Intercepting Web Agent      
Risks in security patterns, Message Inspector      
Risks in security patterns, Message Interceptor Gateway      
Risks in security patterns, Obfuscated Transfer Object      
Risks in security patterns, Password Synchronizer      
Risks in security patterns, Policy Delegate      
Risks in security patterns, Secure Base Action      
Risks in security patterns, Secure Logger      
Risks in security patterns, Secure Message Router      
Risks in security patterns, Secure Pipe      
Risks in security patterns, Secure Service Facade      
Risks in security patterns, Secure Service Proxy      
Risks in security patterns, Secure Session Object      
Risks in security patterns, Single Sign-on Delegator      
Risks in security provisioning patterns      
Risks in trust model      
Risks in use cases      
Risks in Web services      
RMI socket factories      
RMI socket factories, client      
RMI socket factories, server      
RMI/IIOP-based clients      
ROI study      
Roles      
Roles, Business tier      2nd
Roles, Container Managed Security pattern      
Roles, identity management      
Roles, J2EE      2nd
ROM in smart cards      
Root certificates      
Root nodes in attack trees      
Rotate ciphers      
routers      [See Secure Message Router pattern]
RPC style web services      
RSA BSAFE Secure-WS toolkit      
RSA cipher      
RSA-SHA1 algorithm      
Rule Engine      
Rule-based service integration and invocation      
Rules      
Rules in policy design      
Rules, EPAL      
Rules, XACML      
run method      
Run-as identity      
SAAJ API      
SAAJ API for Web services      
SAAJ API in case study      
SAAJ API in Message Inspector pattern      
Safeguards Rule      
SAML (Security Assertion Markup Language)      2nd 3rd
SAML Token profile      
SAML, architecture      2nd
SAML, assertions      2nd 3rd 4th
SAML, assertions, attribute      
SAML, assertions, authentication      2nd
SAML, assertions, authorization      
SAML, domain model      
SAML, for access control      
SAML, Identity management patterns      
SAML, in XACML      2nd 3rd
SAML, J2EE-based applications and web services      
SAML, Java System Access Manager with      
SAML, migration in      
SAML, motivation      
SAML, Policy Administration Point      
SAML, Policy Enforcement Point      
1 2 3 4 5 6 7 8 9 10 11 12 13 14
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2025
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте