Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Авторы: Steel Ch., Nagappan R., Lai R.

Аннотация:

For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1088

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Protocols, Java System Access Manager      
Protocols, SAML      
Protocols, Security Services      
Provider classes      
Provider classes, JCA      
Provider classes, JCE      
Providers      
Providers, authorization      2nd
Providers, J2EE      
Providers, JMS      
Providers, JSSE      
Providers, Liberty specifications      2nd
Providers, LoginModule      
Providers, PCKS      
Providers, Secure Message Router pattern      
Providers, session state maintenance      
Providers, Web services      2nd
Provisioning Service Points      2nd
Provisioning Service Targets      
Provisioning services      [See User account provisioning]
Proxies      
Proxies in Liberty specifications      
Proxies, Secure Service Proxy pattern      [See Secure Service Proxy pattern]
Proxy pattern      2nd
Proxy tunneling      
PSTID-ID mapping tables      
Public Accounting Board      
Public credential set      
Public key infrastructure (PKI)      
Public Key Infrastructure (PKI) in Security Wheel      
Public Key Infrastructure (PKI), limitations      
Public Key Infrastructure (PKI), Web tier patterns      
Public Key Infrastructure (PKI), XML      
Public Key Interoperability Test Suite (PKITS)      
Public keys      
Public keys in assessment checklists      
Public keys, LDAP      2nd
PublicKey interface      
publishPasswordSyncResult method      
Qualitative risk analysis      
Quality of services      
Quality of services, reality checks      
Quality of services, security patterns      
Quality of services, security patterns, factor analysis      
Quality of services, security patterns, security provisioning      
Quantitative risk analysis      
RA (risk analysis)      
Radio Frequency Identification (RFID)      
RAM      
RAM, for Secure Session Object pattern      
RAM, in smart cards      
random number generation      
Rationale in security design      
RBAC profiles      
RC6 algorithm      
Reactive security      
Readers      
Readers, RFID      
Readers, smart card      2nd
Reality checks      2nd
Reality checks for administration      
Reality checks for policies      
Reality checks for quality of services      
Reality checks in security pattern templates      
Reality checks in security pattern templates, Assertion Builder      
Reality checks in security pattern templates, Audit Interceptor      
Reality checks in security pattern templates, Authentication Enforcer      
Reality checks in security pattern templates, Authorization Enforcer      
Reality checks in security pattern templates, Container Managed Security      
Reality checks in security pattern templates, Credential Tokenizer      
Reality checks in security pattern templates, Dynamic Service Management      
Reality checks in security pattern templates, Intercepting Validator      
Reality checks in security pattern templates, Intercepting Web Agent      
Reality checks in security pattern templates, Message Inspector      
Reality checks in security pattern templates, Message Interceptor Gateway      
Reality checks in security pattern templates, Obfuscated Transfer Object      
Reality checks in security pattern templates, Password Synchronizer      
Reality checks in security pattern templates, Policy Delegate      
Reality checks in security pattern templates, Secure Base Action      
Reality checks in security pattern templates, Secure Logger      
Reality checks in security pattern templates, Secure Message Router      
Reality checks in security pattern templates, Secure Pipe      
Reality checks in security pattern templates, Secure Service Facade      
Reality checks in security pattern templates, Secure Service Proxy      
Reality checks in security pattern templates, Secure Session Object      
Reality checks in security pattern templates, Single Sign-on Delegator      
Reality checks, Business tier      
Reality checks, Client Device tier      
Reality checks, Integration tier      
Reality checks, Presentation tier      
Reality checks, Web tier      
realms      
Realms for smart cards      
Realms, J2EE      2nd
Realms, JAAS      
Reconciliation in user account provisioning      
Recovery      2nd
Recovery in case study      
Recovery in use cases      
Recovery in XKMS      
Recovery, key      
Recovery, service      
Redirection, web      
Redundancy in Policy Delegate pattern      
Refactoring security design      
Reference templates for biometrics      
registerObject method      
Registration      
Registration, identity      
Registration, UDDI      
registries      
Registries, Dynamic Service Management pattern      
registries, UDDI      
Registries, Web services      
Registries, XACML      
RegistryMonitor class      
Regulatory policies      
Reissue service, key      
REL (Rights Expression Language)      
Related patterns in security pattern templates      2nd
Related patterns in security pattern templates, Assertion Builder      
Related patterns in security pattern templates, Audit Interceptor      
Related patterns in security pattern templates, Authentication Enforcer      
Related patterns in security pattern templates, Authorization Enforcer      
Related patterns in security pattern templates, Container Managed Security      
Related patterns in security pattern templates, Credential Tokenizer      
Related patterns in security pattern templates, Dynamic Service Management      
Related patterns in security pattern templates, Intercepting Validator      
Related patterns in security pattern templates, Intercepting Web Agent      
Related patterns in security pattern templates, Message Inspector      
Related patterns in security pattern templates, Message Interceptor Gateway      
Related patterns in security pattern templates, Obfuscated Transfer Object      
Related patterns in security pattern templates, Password Synchronizer      
Related patterns in security pattern templates, Policy Delegate      
Related patterns in security pattern templates, Secure Base Action      
Related patterns in security pattern templates, Secure Logger      
Related patterns in security pattern templates, Secure Message Router      
Related patterns in security pattern templates, Secure Pipe      
Related patterns in security pattern templates, Secure Service Facade      
Related patterns in security pattern templates, Secure Service Proxy      
Related patterns in security pattern templates, Secure Session Object      
Related patterns in security pattern templates, Single Sign-on Delegator      
Relationships in Liberty Alliance      
Reliability      
Reliability, Assertion Builder pattern      
Reliability, Secure Message Router pattern      
reloadMBeans method      
Remote interface and services      
Remote interface and services, Secure Service Facade pattern      
Remote interface and services, Single Sign-on Delegator pattern      
removeAssertionReply method      
removeAssertionStatement method      
removeCompRef method      
removeSessionInfo method      
removeSSOTokenMap method      
replay attacks      
Replay attacks, Intercepting Web Agent pattern      
Replay attacks, SAML      
Replay attacks, Web services      
Replay attacks, XKMS      
Reporting practices      
Reporting practices, Gramm-Leach-Bliley Act      
Reporting practices, Sarbanes-Oxley Act      
Reporting services in identity management      
Repository      
Repository for biometric information      
Repository, SAML      
Repository, XACML      
request messages      
Request messages, Message Inspector pattern      2nd
Request messages, Secure Message Router pattern      
Request-reply model      
Request-reply model, SAML      
Request-reply model, SAML, attribute assertion      
Request-reply model, SAML, authentication assertions      
Request-reply model, SPML      
RequestContext class      
RequestContext class, Authentication Enforcer pattern      
RequestContext class, Authorization Enforcer pattern      
RequestContext class, JAAS Login Module Strategy      
Requesters for Web services      
Requesting Authority      
RequestMessage class      
Requests, XACML      
Required flag      
Requirements      
Requirements in use cases      
Requirements, Secure UP      2nd
Requirements, security basics      
Requisite flag      
Resource principals      
Resource profiles      
Resources tier      
respond method      
Response APDUs      
Response Message      
Response Message, Message Inspector pattern      
Response Message, Message Interceptor Gateway pattern      
Retinal analysis      
reusability      
Reusability in security patterns      
Reusability in security patterns, Authorization Enforcer      
Reusability in security patterns, Message Inspector      
Reusability in security patterns, Message Interceptor Gateway      
Reusability in security patterns, Secure Base Action      
Reusability in security patterns, Secure Message Router      
Reusability, Java components      
Reusability, password      
Reverse engineering Java code      
Revocation issues and services      
Revocation issues and services, LDAP      
Revocation issues and services, Single Sign-on Delegator pattern      
Revocation issues and services, X-KRSS      
Revoked smart cards      
RFID (Radio Frequency Identification)      
Rich-client authentication      
Rights Expression Language (REL)      
Rijndael algorithm      
RIPEMD-160 encryption algorithms      
Risk analysis (RA)      
Risk Analyzer      
risks      
Risks in case study      2nd
Risks in patterns-driven security design      
Risks in security patterns      
Risks in security patterns, Assertion Builder      
Risks in security patterns, Audit Interceptor      
Risks in security patterns, Authentication Enforcer      
Risks in security patterns, Authorization Enforcer      
Risks in security patterns, Container Managed Security      
Risks in security patterns, Credential Tokenizer      
Risks in security patterns, Dynamic Service Management      
Risks in security patterns, Intercepting Validator      
Risks in security patterns, Intercepting Web Agent      
Risks in security patterns, Message Inspector      
Risks in security patterns, Message Interceptor Gateway      
Risks in security patterns, Obfuscated Transfer Object      
Risks in security patterns, Password Synchronizer      
Risks in security patterns, Policy Delegate      
Risks in security patterns, Secure Base Action      
Risks in security patterns, Secure Logger      
Risks in security patterns, Secure Message Router      
Risks in security patterns, Secure Pipe      
Risks in security patterns, Secure Service Facade      
Risks in security patterns, Secure Service Proxy      
Risks in security patterns, Secure Session Object      
Risks in security patterns, Single Sign-on Delegator      
Risks in security provisioning patterns      
Risks in trust model      
Risks in use cases      
Risks in Web services      
RMI socket factories      
RMI socket factories, client      
RMI socket factories, server      
RMI/IIOP-based clients      
ROI study      
Roles      
Roles, Business tier      2nd
Roles, Container Managed Security pattern      
Roles, identity management      
Roles, J2EE      2nd
ROM in smart cards      
Root certificates      
Root nodes in attack trees      
Rotate ciphers      
routers      [See Secure Message Router pattern]
RPC style web services      
RSA BSAFE Secure-WS toolkit      
RSA cipher      
RSA-SHA1 algorithm      
Rule Engine      
Rule-based service integration and invocation      
Rules      
Rules in policy design      
Rules, EPAL      
Rules, XACML      
run method      
Run-as identity      
SAAJ API      
SAAJ API for Web services      
SAAJ API in case study      
SAAJ API in Message Inspector pattern      
Safeguards Rule      
SAML (Security Assertion Markup Language)      2nd 3rd
SAML Token profile      
SAML, architecture      2nd
SAML, assertions      2nd 3rd 4th
SAML, assertions, attribute      
SAML, assertions, authentication      2nd
SAML, assertions, authorization      
SAML, domain model      
SAML, for access control      
SAML, Identity management patterns      
SAML, in XACML      2nd 3rd
SAML, J2EE-based applications and web services      
SAML, Java System Access Manager with      
SAML, migration in      
SAML, motivation      
SAML, Policy Administration Point      
SAML, Policy Enforcement Point      
1 2 3 4 5 6 7 8 9 10 11 12 13 14
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте