Авторизация
Поиск по указателям
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Авторы: Steel Ch., Nagappan R., Lai R.
Аннотация: For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.
Язык:
Рубрика: Технология /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Год издания: 2005
Количество страниц: 1088
Добавлена в каталог: 19.08.2007
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
Security provisioning, references
Security provisioning, security patterns
Security provisioning, security patterns, best practices and pitfalls
Security provisioning, security patterns, Password Synchronizer
Security provisioning, summary
Security realms
Security realms for smart cards
Security realms, J2EE 2nd
Security realms, JAAS
Security requirements and goals
Security requirements and goals, authentication
Security requirements and goals, authorization
Security requirements and goals, confidentiality
Security requirements and goals, integrity
Security requirements and goals, non-repudiation
Security Services
Security tokens [See Tokens]
Security Wheel
Security Wheel, hub
Security Wheel, spokes
Security Wheel, wheel edge
SecurityException class
SecurityManager class
SecurityProtocolHandler class
SecurityToken class 2nd
Self-healing in Web services patterns
Sensitive But Unclassified (SBU) information
Sensitive information
Sensitive information in case study
Sensitive information, Secure Logger pattern
Sensitive information, Secure Session Object pattern
Sensitive information, Web tier patterns
Separation of responsibility
Sequence diagrams
Sequence diagrams in security patterns 2nd
Sequence diagrams in security patterns, Assertion Builder
Sequence diagrams in security patterns, Audit Interceptor
Sequence diagrams in security patterns, Authentication Enforcer
Sequence diagrams in security patterns, Authorization Enforcer
Sequence diagrams in security patterns, Container Managed Security
Sequence diagrams in security patterns, Credential Tokenizer
Sequence diagrams in security patterns, Dynamic Service Management
Sequence diagrams in security patterns, Intercepting Validator 2nd
Sequence diagrams in security patterns, Intercepting Web Agent
Sequence diagrams in security patterns, Message Inspector
Sequence diagrams in security patterns, Message Interceptor Gateway
Sequence diagrams in security patterns, Obfuscated Transfer Object
Sequence diagrams in security patterns, Password Synchronizer
Sequence diagrams in security patterns, Policy Delegate
Sequence diagrams in security patterns, Secure Base Action
Sequence diagrams in security patterns, Secure Logger
Sequence diagrams in security patterns, Secure Message Router
Sequence diagrams in security patterns, Secure Pipe
Sequence diagrams in security patterns, Secure Service Facade
Sequence diagrams in security patterns, Secure Service Proxy
Sequence diagrams in security patterns, Secure Session Object
Sequence diagrams in security patterns, Single Sign-on Delegator
Sequence diagrams, identity provider agent strategy
Sequence diagrams, JAAS Login Module strategy
Sequence numbers for deletion detection 2nd
Server Gated Cryptography (SGC)
Server mutual authentication
Server-side communication
Server-side SSL example
Server-to-server connections
Server-to-server connections in case study
Server-to-server connections in use cases
Server-to-server connections, Web tier patterns
ServerHello messages
Servers
Servers in provisioning 2nd
Servers in use cases
Servers, DMZ
Servers, for biometrics
Servers, for smart cards
Servers, Password Synchronizer pattern
Servers, SASL
Servers, Secure Pipe pattern
Servers, sizing
Service Locator pattern
Service Locator pattern, and Secure Service Facade pattern
Service Locator pattern, and Single Sign-on Delegator pattern related
Service provider interfaces (SPIs)
Service provider interfaces (SPIs) in Credential Tokenizer patterns
Service provider interfaces (SPIs) in PAMs
Service Providers
Service providers for Web services
Service providers in Liberty specifications 2nd
Service providers, Single Sign-on Delegator pattern 2nd
Service provisioning
Service provisioning in Security Services
Service Provisioning Markup Language (SPML) 2nd 3rd
Service Provisioning Markup Language (SPML), features
Service Provisioning Markup Language (SPML), implementation
Service Provisioning Markup Language (SPML), operations
Service provisioning, business challenges
Service provisioning, identity management relationship
Service provisioning, scope
Service provisioning, security patterns for 2nd
Service provisioning, user account [See User account provisioning]
Service registry
Service requesters 2nd 3rd
Service-level agreements (SLAs) 2nd
Service-Oriented Architecture (SOA) 2nd 3rd
ServiceConfig class 2nd
ServiceConfigContext class
ServiceEndpoint class
ServiceEndpoint class, Message Inspector pattern
ServiceEndpoint class, Message Interceptor Gateway pattern
ServiceEndpoint class, Secure Message Router pattern
serviceLocator method
ServiceLocator service
ServiceManager class 2nd
ServiceProvider class 2nd
Services
Services, aggregation of
Services, as weakest links
Services, continuity and recovery
Services, continuity and recovery in use cases
Services, continuity and recovery in Web services
Services, continuity and recovery, strategies
Services, directory 2nd
Services, in case study
Services, in case study, catalog
Services, in case study, order fulfillment
Services, in case study, order management
Services, in case study, user login
Services, penetration tests
Services, Web [See Web services tier]
Servlets
Session Authority entity
Session Facade pattern
Session Facade pattern and Secure Service Facade pattern
Session Facade pattern and Secure Session Object pattern
Session facade strategy
Session pattern
Sessions
Sessions, MIDlet
Sessions, states
Sessions, states, Liberty Alliance
Sessions, states, SSL
Sessions, theft
Sessions, theft, Single Sign-on Delegator pattern
Sessions, theft, Web services
Sessions, timeouts in
Sessions, tracking
Sessions, tracking, cookies and URL rewriting in
Sessions, tracking, Web tier patterns
Sessions, weak identifiers
setActionList method
setAssertionType method 2nd
setAuthenticationMethod method 2nd
setComponentsConfig method
setConfigProperties method
setConfRef method
setData method
setLoginContext method
setMaxInactiveInterval method
setMessageDrivenContext method
setProtocolBinding method
setProtocolBinding method, AssertionContextImpl
setProtocolBinding method, PasswordSyncRequest
setProtocolBinding method, SSOContextImpl
setRegistryFileName method
setSecureTransferObject method
setSecurityManager method
setServiceName method
setSessionInfo method 2nd
setSSOTokenMap method
setStatus method
setTokenType method
Setup IDS
setupDefaultUserProfile method
SGC (Server Gated Cryptography)
SHA-1 cryptography
SHA-1 cryptography for JCA message digests
SHA-1 cryptography in Cryptographic Service Providers
SHA1 encryption
SHA256 encryption
SHA512 encryption
sign method
sign method, Signature
sign method, Signer
Sign-ons
Sign-ons, EIS tier
Sign-ons, multiple 2nd
Sign-ons, single [See Single sign-on (SSO) mechanisms]
Signature class
Signature class, JCA
Signature class, Secure Logger pattern
signatures
Signatures for JAD files
Signatures in Java System Access Manager
Signatures, Assertion Builder pattern
Signatures, JCA
Signatures, verification 2nd
Signatures, Web services patterns
Signatures, WS-Security 2nd
Signatures, XML [See XML (Extensible Markup Language)]
Signed applets
Signed MIDlets
Signed security tokens
Signer class
Signing jar files
Signing jar files in Web tier patterns
Signing jar files, jarsigner for
Simple Authentication and Security Layer (SASL)
Simple Authentication and Security Layer (SASL), clients 2nd
Simple Authentication and Security Layer (SASL), installing
Simple Authentication and Security Layer (SASL), servers
Simple Object Access Protocol [See SOAP (Simple Object Access Protocol) and SOAP messages]
SimpleFormAction class
Single Access Point patterns
Single Logout Profile
Single Loss Expectancy (SLE)
Single service secure service proxy strategy
Single sign-on (SSO) mechanisms 2nd 3rd
Single sign-on (SSO) mechanisms, Assertion Builder pattern
Single sign-on (SSO) mechanisms, biometrics
Single sign-on (SSO) mechanisms, Credential Tokenizer patterns
Single sign-on (SSO) mechanisms, cross-domain 2nd
Single sign-on (SSO) mechanisms, federated
Single sign-on (SSO) mechanisms, identity management
Single sign-on (SSO) mechanisms, in case study
Single sign-on (SSO) mechanisms, in use cases
Single sign-on (SSO) mechanisms, J2EE authentication
Single sign-on (SSO) mechanisms, JAAS authorization
Single sign-on (SSO) mechanisms, JGSS
Single sign-on (SSO) mechanisms, Liberty Alliance 2nd 3rd 4th
Single sign-on (SSO) mechanisms, Password Synchronizer pattern
Single sign-on (SSO) mechanisms, SAML in
Single sign-on (SSO) mechanisms, through portals
Single sign-on (SSO) mechanisms, user account provisioning 2nd
Single sign-on (SSO) mechanisms, Web services
Single Sign-on Delegator pattern
Single Sign-on Delegator pattern, consequences
Single Sign-on Delegator pattern, forces
Single Sign-on Delegator pattern, participants and responsibilities
Single Sign-on Delegator pattern, problem
Single Sign-on Delegator pattern, reality check
Single Sign-on Delegator pattern, related patterns
Single Sign-on Delegator pattern, related patterns, Assertion Builder
Single Sign-on Delegator pattern, related patterns, Password Synchronizer
Single Sign-on Delegator pattern, sample code
Single Sign-on Delegator pattern, security factors and risks
Single Sign-on Delegator pattern, solution
Single Sign-on Delegator pattern, strategies
Single Sign-on Delegator pattern, structure
SLAs (service-level agreements) 2nd
SLE (Single Loss Expectancy)
smart cards 2nd 3rd
Smart cards, architecture and implementation model
Smart cards, as Java key stores
Smart cards, best practices
Smart cards, components
Smart cards, for physical access control
Smart cards, in Java security
Smart cards, in JCE
Smart cards, in multi-factor authentication
Smart cards, Java Card technology
Smart cards, logical architecture
Smart cards, operational model
snoop method
SOA (service-oriented architecture) 2nd 3rd
SOAP (Simple Object Access Protocol) and SOAP messages
SOAP (Simple Object Access Protocol) and SOAP messages in security patterns 2nd
SOAP (Simple Object Access Protocol) and SOAP messages in security patterns, Message Inspector 2nd 3rd
SOAP (Simple Object Access Protocol) and SOAP messages in security patterns, Password Synchronizer
SOAP (Simple Object Access Protocol) and SOAP messages in security patterns, Secure Message Router
SOAP (Simple Object Access Protocol) and SOAP messages in security patterns, Secure Service Proxy
SOAP (Simple Object Access Protocol) and SOAP messages, SAML
SOAP (Simple Object Access Protocol) and SOAP messages, SPML
SOAP (Simple Object Access Protocol) and SOAP messages, WS-Policy
SOAP (Simple Object Access Protocol) and SOAP messages, WS-Security 2nd
Socket factories
SocketFactory class
Solution in security patterns
Solution in security patterns, Assertion Builder
Solution in security patterns, Audit Interceptor
Solution in security patterns, Authentication Enforcer
Solution in security patterns, Authorization Enforcer
Solution in security patterns, Container Managed Security
Solution in security patterns, Credential Tokenizer
Solution in security patterns, Dynamic Service Management
Solution in security patterns, Intercepting Validator
Solution in security patterns, Intercepting Web Agent
Solution in security patterns, Message Inspector
Solution in security patterns, Message Interceptor Gateway
Solution in security patterns, Obfuscated Transfer Object
Solution in security patterns, Password Synchronizer
Solution in security patterns, Policy Delegate
Solution in security patterns, Secure Base Action
Solution in security patterns, Secure Logger
Solution in security patterns, Secure Message Router
Solution in security patterns, Secure Pipe
Solution in security patterns, Secure Service Facade
Solution in security patterns, Secure Service Proxy
Solution in security patterns, Secure Session Object
Solution in security patterns, Single Sign-on Delegator
SOP (Standard Operating Procedure) documents
Реклама