Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Авторы: Steel Ch., Nagappan R., Lai R.

Аннотация:

For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1088

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Security provisioning, references      
Security provisioning, security patterns      
Security provisioning, security patterns, best practices and pitfalls      
Security provisioning, security patterns, Password Synchronizer      
Security provisioning, summary      
Security realms      
Security realms for smart cards      
Security realms, J2EE      2nd
Security realms, JAAS      
Security requirements and goals      
Security requirements and goals, authentication      
Security requirements and goals, authorization      
Security requirements and goals, confidentiality      
Security requirements and goals, integrity      
Security requirements and goals, non-repudiation      
Security Services      
Security tokens      [See Tokens]
Security Wheel      
Security Wheel, hub      
Security Wheel, spokes      
Security Wheel, wheel edge      
SecurityException class      
SecurityManager class      
SecurityProtocolHandler class      
SecurityToken class      2nd
Self-healing in Web services patterns      
Sensitive But Unclassified (SBU) information      
Sensitive information      
Sensitive information in case study      
Sensitive information, Secure Logger pattern      
Sensitive information, Secure Session Object pattern      
Sensitive information, Web tier patterns      
Separation of responsibility      
Sequence diagrams      
Sequence diagrams in security patterns      2nd
Sequence diagrams in security patterns, Assertion Builder      
Sequence diagrams in security patterns, Audit Interceptor      
Sequence diagrams in security patterns, Authentication Enforcer      
Sequence diagrams in security patterns, Authorization Enforcer      
Sequence diagrams in security patterns, Container Managed Security      
Sequence diagrams in security patterns, Credential Tokenizer      
Sequence diagrams in security patterns, Dynamic Service Management      
Sequence diagrams in security patterns, Intercepting Validator      2nd
Sequence diagrams in security patterns, Intercepting Web Agent      
Sequence diagrams in security patterns, Message Inspector      
Sequence diagrams in security patterns, Message Interceptor Gateway      
Sequence diagrams in security patterns, Obfuscated Transfer Object      
Sequence diagrams in security patterns, Password Synchronizer      
Sequence diagrams in security patterns, Policy Delegate      
Sequence diagrams in security patterns, Secure Base Action      
Sequence diagrams in security patterns, Secure Logger      
Sequence diagrams in security patterns, Secure Message Router      
Sequence diagrams in security patterns, Secure Pipe      
Sequence diagrams in security patterns, Secure Service Facade      
Sequence diagrams in security patterns, Secure Service Proxy      
Sequence diagrams in security patterns, Secure Session Object      
Sequence diagrams in security patterns, Single Sign-on Delegator      
Sequence diagrams, identity provider agent strategy      
Sequence diagrams, JAAS Login Module strategy      
Sequence numbers for deletion detection      2nd
Server Gated Cryptography (SGC)      
Server mutual authentication      
Server-side communication      
Server-side SSL example      
Server-to-server connections      
Server-to-server connections in case study      
Server-to-server connections in use cases      
Server-to-server connections, Web tier patterns      
ServerHello messages      
Servers      
Servers in provisioning      2nd
Servers in use cases      
Servers, DMZ      
Servers, for biometrics      
Servers, for smart cards      
Servers, Password Synchronizer pattern      
Servers, SASL      
Servers, Secure Pipe pattern
Servers, sizing
Service Locator pattern      
Service Locator pattern, and Secure Service Facade pattern      
Service Locator pattern, and Single Sign-on Delegator pattern related
Service provider interfaces (SPIs)      
Service provider interfaces (SPIs) in Credential Tokenizer patterns
Service provider interfaces (SPIs) in PAMs
Service Providers
Service providers for Web services
Service providers in Liberty specifications      2nd
Service providers, Single Sign-on Delegator pattern      2nd
Service provisioning
Service provisioning in Security Services      
Service Provisioning Markup Language (SPML)      2nd 3rd
Service Provisioning Markup Language (SPML), features      
Service Provisioning Markup Language (SPML), implementation      
Service Provisioning Markup Language (SPML), operations      
Service provisioning, business challenges      
Service provisioning, identity management relationship      
Service provisioning, scope      
Service provisioning, security patterns for      2nd
Service provisioning, user account      [See User account provisioning]
Service registry      
Service requesters      2nd 3rd
Service-level agreements (SLAs)      2nd
Service-Oriented Architecture (SOA)      2nd 3rd
ServiceConfig class      2nd
ServiceConfigContext class      
ServiceEndpoint class
ServiceEndpoint class, Message Inspector pattern
ServiceEndpoint class, Message Interceptor Gateway pattern      
ServiceEndpoint class, Secure Message Router pattern      
serviceLocator method      
ServiceLocator service      
ServiceManager class      2nd
ServiceProvider class      2nd
Services
Services, aggregation of
Services, as weakest links
Services, continuity and recovery
Services, continuity and recovery in use cases
Services, continuity and recovery in Web services      
Services, continuity and recovery, strategies
Services, directory      2nd
Services, in case study      
Services, in case study, catalog      
Services, in case study, order fulfillment      
Services, in case study, order management
Services, in case study, user login
Services, penetration tests
Services, Web      [See Web services tier]
Servlets
Session Authority entity      
Session Facade pattern      
Session Facade pattern and Secure Service Facade pattern
Session Facade pattern and Secure Session Object pattern      
Session facade strategy
Session pattern
Sessions
Sessions, MIDlet
Sessions, states
Sessions, states, Liberty Alliance
Sessions, states, SSL
Sessions, theft
Sessions, theft, Single Sign-on Delegator pattern
Sessions, theft, Web services
Sessions, timeouts in
Sessions, tracking
Sessions, tracking, cookies and URL rewriting in
Sessions, tracking, Web tier patterns      
Sessions, weak identifiers
setActionList method
setAssertionType method      2nd
setAuthenticationMethod method      2nd
setComponentsConfig method
setConfigProperties method
setConfRef method
setData method
setLoginContext method
setMaxInactiveInterval method
setMessageDrivenContext method
setProtocolBinding method      
setProtocolBinding method, AssertionContextImpl
setProtocolBinding method, PasswordSyncRequest
setProtocolBinding method, SSOContextImpl
setRegistryFileName method
setSecureTransferObject method
setSecurityManager method
setServiceName method
setSessionInfo method      2nd
setSSOTokenMap method
setStatus method
setTokenType method
Setup IDS
setupDefaultUserProfile method      
SGC (Server Gated Cryptography)
SHA-1 cryptography      
SHA-1 cryptography for JCA message digests
SHA-1 cryptography in Cryptographic Service Providers
SHA1 encryption
SHA256 encryption
SHA512 encryption
sign method      
sign method, Signature      
sign method, Signer
Sign-ons
Sign-ons, EIS tier
Sign-ons, multiple      2nd
Sign-ons, single      [See Single sign-on (SSO) mechanisms]
Signature class
Signature class, JCA
Signature class, Secure Logger pattern
signatures
Signatures for JAD files
Signatures in Java System Access Manager
Signatures, Assertion Builder pattern
Signatures, JCA
Signatures, verification      2nd
Signatures, Web services patterns
Signatures, WS-Security      2nd
Signatures, XML      [See XML (Extensible Markup Language)]
Signed applets      
Signed MIDlets      
Signed security tokens
Signer class      
Signing jar files
Signing jar files in Web tier patterns      
Signing jar files, jarsigner for      
Simple Authentication and Security Layer (SASL)      
Simple Authentication and Security Layer (SASL), clients      2nd
Simple Authentication and Security Layer (SASL), installing      
Simple Authentication and Security Layer (SASL), servers      
Simple Object Access Protocol      [See SOAP (Simple Object Access Protocol) and SOAP messages]
SimpleFormAction class      
Single Access Point patterns      
Single Logout Profile
Single Loss Expectancy (SLE)      
Single service secure service proxy strategy      
Single sign-on (SSO) mechanisms      2nd 3rd
Single sign-on (SSO) mechanisms, Assertion Builder pattern      
Single sign-on (SSO) mechanisms, biometrics      
Single sign-on (SSO) mechanisms, Credential Tokenizer patterns      
Single sign-on (SSO) mechanisms, cross-domain      2nd
Single sign-on (SSO) mechanisms, federated
Single sign-on (SSO) mechanisms, identity management
Single sign-on (SSO) mechanisms, in case study
Single sign-on (SSO) mechanisms, in use cases
Single sign-on (SSO) mechanisms, J2EE authentication      
Single sign-on (SSO) mechanisms, JAAS authorization
Single sign-on (SSO) mechanisms, JGSS
Single sign-on (SSO) mechanisms, Liberty Alliance      2nd 3rd 4th
Single sign-on (SSO) mechanisms, Password Synchronizer pattern      
Single sign-on (SSO) mechanisms, SAML in      
Single sign-on (SSO) mechanisms, through portals      
Single sign-on (SSO) mechanisms, user account provisioning      2nd
Single sign-on (SSO) mechanisms, Web services
Single Sign-on Delegator pattern      
Single Sign-on Delegator pattern, consequences      
Single Sign-on Delegator pattern, forces      
Single Sign-on Delegator pattern, participants and responsibilities      
Single Sign-on Delegator pattern, problem      
Single Sign-on Delegator pattern, reality check      
Single Sign-on Delegator pattern, related patterns      
Single Sign-on Delegator pattern, related patterns, Assertion Builder      
Single Sign-on Delegator pattern, related patterns, Password Synchronizer      
Single Sign-on Delegator pattern, sample code      
Single Sign-on Delegator pattern, security factors and risks      
Single Sign-on Delegator pattern, solution      
Single Sign-on Delegator pattern, strategies      
Single Sign-on Delegator pattern, structure      
SLAs (service-level agreements)      2nd
SLE (Single Loss Expectancy)      
smart cards      2nd 3rd
Smart cards, architecture and implementation model      
Smart cards, as Java key stores
Smart cards, best practices
Smart cards, components      
Smart cards, for physical access control      
Smart cards, in Java security      
Smart cards, in JCE      
Smart cards, in multi-factor authentication
Smart cards, Java Card technology      
Smart cards, logical architecture      
Smart cards, operational model
snoop method
SOA (service-oriented architecture)      2nd 3rd
SOAP (Simple Object Access Protocol) and SOAP messages      
SOAP (Simple Object Access Protocol) and SOAP messages in security patterns      2nd
SOAP (Simple Object Access Protocol) and SOAP messages in security patterns, Message Inspector      2nd 3rd
SOAP (Simple Object Access Protocol) and SOAP messages in security patterns, Password Synchronizer
SOAP (Simple Object Access Protocol) and SOAP messages in security patterns, Secure Message Router
SOAP (Simple Object Access Protocol) and SOAP messages in security patterns, Secure Service Proxy
SOAP (Simple Object Access Protocol) and SOAP messages, SAML
SOAP (Simple Object Access Protocol) and SOAP messages, SPML
SOAP (Simple Object Access Protocol) and SOAP messages, WS-Policy      
SOAP (Simple Object Access Protocol) and SOAP messages, WS-Security      2nd
Socket factories
SocketFactory class
Solution in security patterns
Solution in security patterns, Assertion Builder      
Solution in security patterns, Audit Interceptor      
Solution in security patterns, Authentication Enforcer
Solution in security patterns, Authorization Enforcer      
Solution in security patterns, Container Managed Security
Solution in security patterns, Credential Tokenizer
Solution in security patterns, Dynamic Service Management
Solution in security patterns, Intercepting Validator
Solution in security patterns, Intercepting Web Agent
Solution in security patterns, Message Inspector
Solution in security patterns, Message Interceptor Gateway
Solution in security patterns, Obfuscated Transfer Object      
Solution in security patterns, Password Synchronizer
Solution in security patterns, Policy Delegate      
Solution in security patterns, Secure Base Action
Solution in security patterns, Secure Logger
Solution in security patterns, Secure Message Router
Solution in security patterns, Secure Pipe
Solution in security patterns, Secure Service Facade
Solution in security patterns, Secure Service Proxy
Solution in security patterns, Secure Session Object      
Solution in security patterns, Single Sign-on Delegator
SOP (Standard Operating Procedure) documents      
1 2 3 4 5 6 7 8 9 10 11 12 13 14
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2025
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте