Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Авторы: Steel Ch., Nagappan R., Lai R.

Аннотация:

For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1088

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Security provisioning, references      
Security provisioning, security patterns      
Security provisioning, security patterns, best practices and pitfalls      
Security provisioning, security patterns, Password Synchronizer      
Security provisioning, summary      
Security realms      
Security realms for smart cards      
Security realms, J2EE      2nd
Security realms, JAAS      
Security requirements and goals      
Security requirements and goals, authentication      
Security requirements and goals, authorization      
Security requirements and goals, confidentiality      
Security requirements and goals, integrity      
Security requirements and goals, non-repudiation      
Security Services      
Security tokens      [See Tokens]
Security Wheel      
Security Wheel, hub      
Security Wheel, spokes      
Security Wheel, wheel edge      
SecurityException class      
SecurityManager class      
SecurityProtocolHandler class      
SecurityToken class      2nd
Self-healing in Web services patterns      
Sensitive But Unclassified (SBU) information      
Sensitive information      
Sensitive information in case study      
Sensitive information, Secure Logger pattern      
Sensitive information, Secure Session Object pattern      
Sensitive information, Web tier patterns      
Separation of responsibility      
Sequence diagrams      
Sequence diagrams in security patterns      2nd
Sequence diagrams in security patterns, Assertion Builder      
Sequence diagrams in security patterns, Audit Interceptor      
Sequence diagrams in security patterns, Authentication Enforcer      
Sequence diagrams in security patterns, Authorization Enforcer      
Sequence diagrams in security patterns, Container Managed Security      
Sequence diagrams in security patterns, Credential Tokenizer      
Sequence diagrams in security patterns, Dynamic Service Management      
Sequence diagrams in security patterns, Intercepting Validator      2nd
Sequence diagrams in security patterns, Intercepting Web Agent      
Sequence diagrams in security patterns, Message Inspector      
Sequence diagrams in security patterns, Message Interceptor Gateway      
Sequence diagrams in security patterns, Obfuscated Transfer Object      
Sequence diagrams in security patterns, Password Synchronizer      
Sequence diagrams in security patterns, Policy Delegate      
Sequence diagrams in security patterns, Secure Base Action      
Sequence diagrams in security patterns, Secure Logger      
Sequence diagrams in security patterns, Secure Message Router      
Sequence diagrams in security patterns, Secure Pipe      
Sequence diagrams in security patterns, Secure Service Facade      
Sequence diagrams in security patterns, Secure Service Proxy      
Sequence diagrams in security patterns, Secure Session Object      
Sequence diagrams in security patterns, Single Sign-on Delegator      
Sequence diagrams, identity provider agent strategy      
Sequence diagrams, JAAS Login Module strategy      
Sequence numbers for deletion detection      2nd
Server Gated Cryptography (SGC)      
Server mutual authentication      
Server-side communication      
Server-side SSL example      
Server-to-server connections      
Server-to-server connections in case study      
Server-to-server connections in use cases      
Server-to-server connections, Web tier patterns      
ServerHello messages      
Servers      
Servers in provisioning      2nd
Servers in use cases      
Servers, DMZ      
Servers, for biometrics      
Servers, for smart cards      
Servers, Password Synchronizer pattern      
Servers, SASL      
Servers, Secure Pipe pattern      
Servers, sizing      
Service Locator pattern      
Service Locator pattern, and Secure Service Facade pattern      
Service Locator pattern, and Single Sign-on Delegator pattern related      
Service provider interfaces (SPIs)      
Service provider interfaces (SPIs) in Credential Tokenizer patterns      
Service provider interfaces (SPIs) in PAMs      
Service Providers      
Service providers for Web services      
Service providers in Liberty specifications      2nd
Service providers, Single Sign-on Delegator pattern      2nd
Service provisioning      
Service provisioning in Security Services      
Service Provisioning Markup Language (SPML)      2nd 3rd
Service Provisioning Markup Language (SPML), features      
Service Provisioning Markup Language (SPML), implementation      
Service Provisioning Markup Language (SPML), operations      
Service provisioning, business challenges      
Service provisioning, identity management relationship      
Service provisioning, scope      
Service provisioning, security patterns for      2nd
Service provisioning, user account      [See User account provisioning]
Service registry      
Service requesters      2nd 3rd
Service-level agreements (SLAs)      2nd
Service-Oriented Architecture (SOA)      2nd 3rd
ServiceConfig class      2nd
ServiceConfigContext class      
ServiceEndpoint class      
ServiceEndpoint class, Message Inspector pattern      
ServiceEndpoint class, Message Interceptor Gateway pattern      
ServiceEndpoint class, Secure Message Router pattern      
serviceLocator method      
ServiceLocator service      
ServiceManager class      2nd
ServiceProvider class      2nd
Services      
Services, aggregation of      
Services, as weakest links      
Services, continuity and recovery      
Services, continuity and recovery in use cases      
Services, continuity and recovery in Web services      
Services, continuity and recovery, strategies      
Services, directory      2nd
Services, in case study      
Services, in case study, catalog      
Services, in case study, order fulfillment      
Services, in case study, order management      
Services, in case study, user login      
Services, penetration tests      
Services, Web      [See Web services tier]
Servlets      
Session Authority entity      
Session Facade pattern      
Session Facade pattern and Secure Service Facade pattern      
Session Facade pattern and Secure Session Object pattern      
Session facade strategy      
Session pattern      
Sessions      
Sessions, MIDlet      
Sessions, states      
Sessions, states, Liberty Alliance      
Sessions, states, SSL      
Sessions, theft      
Sessions, theft, Single Sign-on Delegator pattern      
Sessions, theft, Web services      
Sessions, timeouts in      
Sessions, tracking      
Sessions, tracking, cookies and URL rewriting in      
Sessions, tracking, Web tier patterns      
Sessions, weak identifiers      
setActionList method      
setAssertionType method      2nd
setAuthenticationMethod method      2nd
setComponentsConfig method      
setConfigProperties method      
setConfRef method      
setData method      
setLoginContext method      
setMaxInactiveInterval method      
setMessageDrivenContext method      
setProtocolBinding method      
setProtocolBinding method, AssertionContextImpl      
setProtocolBinding method, PasswordSyncRequest      
setProtocolBinding method, SSOContextImpl      
setRegistryFileName method      
setSecureTransferObject method      
setSecurityManager method      
setServiceName method      
setSessionInfo method      2nd
setSSOTokenMap method      
setStatus method      
setTokenType method      
Setup IDS      
setupDefaultUserProfile method      
SGC (Server Gated Cryptography)      
SHA-1 cryptography
SHA-1 cryptography for JCA message digests
SHA-1 cryptography in Cryptographic Service Providers
SHA1 encryption      
SHA256 encryption      
SHA512 encryption      
sign method      
sign method, Signature      
sign method, Signer      
Sign-ons      
Sign-ons, EIS tier      
Sign-ons, multiple      2nd
Sign-ons, single      [See Single sign-on (SSO) mechanisms]
Signature class      
Signature class, JCA      
Signature class, Secure Logger pattern      
signatures      
Signatures for JAD files      
Signatures in Java System Access Manager      
Signatures, Assertion Builder pattern      
Signatures, JCA      
Signatures, verification      2nd
Signatures, Web services patterns      
Signatures, WS-Security      2nd
Signatures, XML      [See XML (Extensible Markup Language)]
Signed applets      
Signed MIDlets      
Signed security tokens      
Signer class      
Signing jar files      
Signing jar files in Web tier patterns      
Signing jar files, jarsigner for      
Simple Authentication and Security Layer (SASL)      
Simple Authentication and Security Layer (SASL), clients      2nd
Simple Authentication and Security Layer (SASL), installing      
Simple Authentication and Security Layer (SASL), servers      
Simple Object Access Protocol      [See SOAP (Simple Object Access Protocol) and SOAP messages]
SimpleFormAction class      
Single Access Point patterns      
Single Logout Profile      
Single Loss Expectancy (SLE)      
Single service secure service proxy strategy      
Single sign-on (SSO) mechanisms      2nd 3rd
Single sign-on (SSO) mechanisms, Assertion Builder pattern      
Single sign-on (SSO) mechanisms, biometrics      
Single sign-on (SSO) mechanisms, Credential Tokenizer patterns      
Single sign-on (SSO) mechanisms, cross-domain      2nd
Single sign-on (SSO) mechanisms, federated      
Single sign-on (SSO) mechanisms, identity management      
Single sign-on (SSO) mechanisms, in case study      
Single sign-on (SSO) mechanisms, in use cases      
Single sign-on (SSO) mechanisms, J2EE authentication      
Single sign-on (SSO) mechanisms, JAAS authorization      
Single sign-on (SSO) mechanisms, JGSS      
Single sign-on (SSO) mechanisms, Liberty Alliance      2nd 3rd 4th
Single sign-on (SSO) mechanisms, Password Synchronizer pattern      
Single sign-on (SSO) mechanisms, SAML in      
Single sign-on (SSO) mechanisms, through portals      
Single sign-on (SSO) mechanisms, user account provisioning      2nd
Single sign-on (SSO) mechanisms, Web services      
Single Sign-on Delegator pattern      
Single Sign-on Delegator pattern, consequences      
Single Sign-on Delegator pattern, forces      
Single Sign-on Delegator pattern, participants and responsibilities      
Single Sign-on Delegator pattern, problem      
Single Sign-on Delegator pattern, reality check      
Single Sign-on Delegator pattern, related patterns      
Single Sign-on Delegator pattern, related patterns, Assertion Builder      
Single Sign-on Delegator pattern, related patterns, Password Synchronizer      
Single Sign-on Delegator pattern, sample code      
Single Sign-on Delegator pattern, security factors and risks      
Single Sign-on Delegator pattern, solution      
Single Sign-on Delegator pattern, strategies      
Single Sign-on Delegator pattern, structure      
SLAs (service-level agreements)      2nd
SLE (Single Loss Expectancy)      
smart cards      2nd 3rd
Smart cards, architecture and implementation model      
Smart cards, as Java key stores      
Smart cards, best practices      
Smart cards, components      
Smart cards, for physical access control      
Smart cards, in Java security      
Smart cards, in JCE      
Smart cards, in multi-factor authentication      
Smart cards, Java Card technology      
Smart cards, logical architecture      
Smart cards, operational model      
snoop method      
SOA (service-oriented architecture)      2nd 3rd
SOAP (Simple Object Access Protocol) and SOAP messages      
SOAP (Simple Object Access Protocol) and SOAP messages in security patterns      2nd
SOAP (Simple Object Access Protocol) and SOAP messages in security patterns, Message Inspector      2nd 3rd
SOAP (Simple Object Access Protocol) and SOAP messages in security patterns, Password Synchronizer      
SOAP (Simple Object Access Protocol) and SOAP messages in security patterns, Secure Message Router      
SOAP (Simple Object Access Protocol) and SOAP messages in security patterns, Secure Service Proxy      
SOAP (Simple Object Access Protocol) and SOAP messages, SAML      
SOAP (Simple Object Access Protocol) and SOAP messages, SPML      
SOAP (Simple Object Access Protocol) and SOAP messages, WS-Policy      
SOAP (Simple Object Access Protocol) and SOAP messages, WS-Security      2nd
Socket factories      
SocketFactory class      
Solution in security patterns      
Solution in security patterns, Assertion Builder      
Solution in security patterns, Audit Interceptor      
Solution in security patterns, Authentication Enforcer      
Solution in security patterns, Authorization Enforcer      
Solution in security patterns, Container Managed Security      
Solution in security patterns, Credential Tokenizer      
Solution in security patterns, Dynamic Service Management      
Solution in security patterns, Intercepting Validator      
Solution in security patterns, Intercepting Web Agent      
Solution in security patterns, Message Inspector      
Solution in security patterns, Message Interceptor Gateway      
Solution in security patterns, Obfuscated Transfer Object      
Solution in security patterns, Password Synchronizer      
Solution in security patterns, Policy Delegate      
Solution in security patterns, Secure Base Action      
Solution in security patterns, Secure Logger      
Solution in security patterns, Secure Message Router      
Solution in security patterns, Secure Pipe      
Solution in security patterns, Secure Service Facade      
Solution in security patterns, Secure Service Proxy      
Solution in security patterns, Secure Session Object      
Solution in security patterns, Single Sign-on Delegator      
SOP (Standard Operating Procedure) documents      
1 2 3 4 5 6 7 8 9 10 11 12 13 14
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте