Авторизация
Поиск по указателям
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Авторы: Steel Ch., Nagappan R., Lai R.
Аннотация: For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.
Язык:
Рубрика: Технология /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Год издания: 2005
Количество страниц: 1088
Добавлена в каталог: 19.08.2007
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
Protocols, Java System Access Manager
Protocols, SAML
Protocols, Security Services
Provider classes
Provider classes, JCA
Provider classes, JCE
Providers
Providers, authorization 2nd
Providers, J2EE
Providers, JMS
Providers, JSSE
Providers, Liberty specifications 2nd
Providers, LoginModule
Providers, PCKS
Providers, Secure Message Router pattern
Providers, session state maintenance
Providers, Web services 2nd
Provisioning Service Points 2nd
Provisioning Service Targets
Provisioning services [See User account provisioning]
Proxies
Proxies in Liberty specifications
Proxies, Secure Service Proxy pattern [See Secure Service Proxy pattern]
Proxy pattern 2nd
Proxy tunneling
PSTID-ID mapping tables
Public Accounting Board
Public credential set
Public key infrastructure (PKI)
Public Key Infrastructure (PKI) in Security Wheel
Public Key Infrastructure (PKI), limitations
Public Key Infrastructure (PKI), Web tier patterns
Public Key Infrastructure (PKI), XML
Public Key Interoperability Test Suite (PKITS)
Public keys
Public keys in assessment checklists
Public keys, LDAP 2nd
PublicKey interface
publishPasswordSyncResult method
Qualitative risk analysis
Quality of services
Quality of services, reality checks
Quality of services, security patterns
Quality of services, security patterns, factor analysis
Quality of services, security patterns, security provisioning
Quantitative risk analysis
RA (risk analysis)
Radio Frequency Identification (RFID)
RAM
RAM, for Secure Session Object pattern
RAM, in smart cards
random number generation
Rationale in security design
RBAC profiles
RC6 algorithm
Reactive security
Readers
Readers, RFID
Readers, smart card 2nd
Reality checks 2nd
Reality checks for administration
Reality checks for policies
Reality checks for quality of services
Reality checks in security pattern templates
Reality checks in security pattern templates, Assertion Builder
Reality checks in security pattern templates, Audit Interceptor
Reality checks in security pattern templates, Authentication Enforcer
Reality checks in security pattern templates, Authorization Enforcer
Reality checks in security pattern templates, Container Managed Security
Reality checks in security pattern templates, Credential Tokenizer
Reality checks in security pattern templates, Dynamic Service Management
Reality checks in security pattern templates, Intercepting Validator
Reality checks in security pattern templates, Intercepting Web Agent
Reality checks in security pattern templates, Message Inspector
Reality checks in security pattern templates, Message Interceptor Gateway
Reality checks in security pattern templates, Obfuscated Transfer Object
Reality checks in security pattern templates, Password Synchronizer
Reality checks in security pattern templates, Policy Delegate
Reality checks in security pattern templates, Secure Base Action
Reality checks in security pattern templates, Secure Logger
Reality checks in security pattern templates, Secure Message Router
Reality checks in security pattern templates, Secure Pipe
Reality checks in security pattern templates, Secure Service Facade
Reality checks in security pattern templates, Secure Service Proxy
Reality checks in security pattern templates, Secure Session Object
Reality checks in security pattern templates, Single Sign-on Delegator
Reality checks, Business tier
Reality checks, Client Device tier
Reality checks, Integration tier
Reality checks, Presentation tier
Reality checks, Web tier
realms
Realms for smart cards
Realms, J2EE 2nd
Realms, JAAS
Reconciliation in user account provisioning
Recovery 2nd
Recovery in case study
Recovery in use cases
Recovery in XKMS
Recovery, key
Recovery, service
Redirection, web
Redundancy in Policy Delegate pattern
Refactoring security design
Reference templates for biometrics
registerObject method
Registration
Registration, identity
Registration, UDDI
registries
Registries, Dynamic Service Management pattern
registries, UDDI
Registries, Web services
Registries, XACML
RegistryMonitor class
Regulatory policies
Reissue service, key
REL (Rights Expression Language)
Related patterns in security pattern templates 2nd
Related patterns in security pattern templates, Assertion Builder
Related patterns in security pattern templates, Audit Interceptor
Related patterns in security pattern templates, Authentication Enforcer
Related patterns in security pattern templates, Authorization Enforcer
Related patterns in security pattern templates, Container Managed Security
Related patterns in security pattern templates, Credential Tokenizer
Related patterns in security pattern templates, Dynamic Service Management
Related patterns in security pattern templates, Intercepting Validator
Related patterns in security pattern templates, Intercepting Web Agent
Related patterns in security pattern templates, Message Inspector
Related patterns in security pattern templates, Message Interceptor Gateway
Related patterns in security pattern templates, Obfuscated Transfer Object
Related patterns in security pattern templates, Password Synchronizer
Related patterns in security pattern templates, Policy Delegate
Related patterns in security pattern templates, Secure Base Action
Related patterns in security pattern templates, Secure Logger
Related patterns in security pattern templates, Secure Message Router
Related patterns in security pattern templates, Secure Pipe
Related patterns in security pattern templates, Secure Service Facade
Related patterns in security pattern templates, Secure Service Proxy
Related patterns in security pattern templates, Secure Session Object
Related patterns in security pattern templates, Single Sign-on Delegator
Relationships in Liberty Alliance
Reliability
Reliability, Assertion Builder pattern
Reliability, Secure Message Router pattern
reloadMBeans method
Remote interface and services
Remote interface and services, Secure Service Facade pattern
Remote interface and services, Single Sign-on Delegator pattern
removeAssertionReply method
removeAssertionStatement method
removeCompRef method
removeSessionInfo method
removeSSOTokenMap method
replay attacks
Replay attacks, Intercepting Web Agent pattern
Replay attacks, SAML
Replay attacks, Web services
Replay attacks, XKMS
Reporting practices
Reporting practices, Gramm-Leach-Bliley Act
Reporting practices, Sarbanes-Oxley Act
Reporting services in identity management
Repository
Repository for biometric information
Repository, SAML
Repository, XACML
request messages
Request messages, Message Inspector pattern 2nd
Request messages, Secure Message Router pattern
Request-reply model
Request-reply model, SAML
Request-reply model, SAML, attribute assertion
Request-reply model, SAML, authentication assertions
Request-reply model, SPML
RequestContext class
RequestContext class, Authentication Enforcer pattern
RequestContext class, Authorization Enforcer pattern
RequestContext class, JAAS Login Module Strategy
Requesters for Web services
Requesting Authority
RequestMessage class
Requests, XACML
Required flag
Requirements
Requirements in use cases
Requirements, Secure UP 2nd
Requirements, security basics
Requisite flag
Resource principals
Resource profiles
Resources tier
respond method
Response APDUs
Response Message
Response Message, Message Inspector pattern
Response Message, Message Interceptor Gateway pattern
Retinal analysis
reusability
Reusability in security patterns
Reusability in security patterns, Authorization Enforcer
Reusability in security patterns, Message Inspector
Reusability in security patterns, Message Interceptor Gateway
Reusability in security patterns, Secure Base Action
Reusability in security patterns, Secure Message Router
Reusability, Java components
Reusability, password
Reverse engineering Java code
Revocation issues and services
Revocation issues and services, LDAP
Revocation issues and services, Single Sign-on Delegator pattern
Revocation issues and services, X-KRSS
Revoked smart cards
RFID (Radio Frequency Identification)
Rich-client authentication
Rights Expression Language (REL)
Rijndael algorithm
RIPEMD-160 encryption algorithms
Risk analysis (RA)
Risk Analyzer
risks
Risks in case study 2nd
Risks in patterns-driven security design
Risks in security patterns
Risks in security patterns, Assertion Builder
Risks in security patterns, Audit Interceptor
Risks in security patterns, Authentication Enforcer
Risks in security patterns, Authorization Enforcer
Risks in security patterns, Container Managed Security
Risks in security patterns, Credential Tokenizer
Risks in security patterns, Dynamic Service Management
Risks in security patterns, Intercepting Validator
Risks in security patterns, Intercepting Web Agent
Risks in security patterns, Message Inspector
Risks in security patterns, Message Interceptor Gateway
Risks in security patterns, Obfuscated Transfer Object
Risks in security patterns, Password Synchronizer
Risks in security patterns, Policy Delegate
Risks in security patterns, Secure Base Action
Risks in security patterns, Secure Logger
Risks in security patterns, Secure Message Router
Risks in security patterns, Secure Pipe
Risks in security patterns, Secure Service Facade
Risks in security patterns, Secure Service Proxy
Risks in security patterns, Secure Session Object
Risks in security patterns, Single Sign-on Delegator
Risks in security provisioning patterns
Risks in trust model
Risks in use cases
Risks in Web services
RMI socket factories
RMI socket factories, client
RMI socket factories, server
RMI/IIOP-based clients
ROI study
Roles
Roles, Business tier 2nd
Roles, Container Managed Security pattern
Roles, identity management
Roles, J2EE 2nd
ROM in smart cards
Root certificates
Root nodes in attack trees
Rotate ciphers
routers [See Secure Message Router pattern]
RPC style web services
RSA BSAFE Secure-WS toolkit
RSA cipher
RSA-SHA1 algorithm
Rule Engine
Rule-based service integration and invocation
Rules
Rules in policy design
Rules, EPAL
Rules, XACML
run method
Run-as identity
SAAJ API
SAAJ API for Web services
SAAJ API in case study
SAAJ API in Message Inspector pattern
Safeguards Rule
SAML (Security Assertion Markup Language) 2nd 3rd
SAML Token profile
SAML, architecture 2nd
SAML, assertions 2nd 3rd 4th
SAML, assertions, attribute
SAML, assertions, authentication 2nd
SAML, assertions, authorization
SAML, domain model
SAML, for access control
SAML, Identity management patterns
SAML, in XACML 2nd 3rd
SAML, J2EE-based applications and web services
SAML, Java System Access Manager with
SAML, migration in
SAML, motivation
SAML, Policy Administration Point
SAML, Policy Enforcement Point
Реклама