Авторизация
Поиск по указателям
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Авторы: Steel Ch., Nagappan R., Lai R.
Аннотация: For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.
Язык:
Рубрика: Технология /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Год издания: 2005
Количество страниц: 1088
Добавлена в каталог: 19.08.2007
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
URLClassLoader class
URLConnection timeouts
use cases
Use cases, actors
Use cases, diagrams
Use cases, in Secure UP
Use cases, methodology choices
Use cases, online portals 2nd
Use cases, requirements identification
Use cases, system constraints
Use cases, system environment
User account provisioning 2nd
User account provisioning, approaches to
User account provisioning, architecture
User account provisioning, architecture, centralized model vs. decentralized
User account provisioning, architecture, components of
User account provisioning, architecture, logical
User account provisioning, differentiators for
User account provisioning, identity management
User account provisioning, identity provider infrastructure integration
User account provisioning, portal integration
User account provisioning, scenario
User account provisioning, services
User agents
User login
User login in case study
User login, biometrics
User login, use case
Usernames
Usernames, JAAS authorization
Usernames, WS-Security
UsernameToken class 2nd
Users in J2EE
UserStore class
UUID pattern and profile
UUID pattern and profile, SAML
UUID pattern and profile, Secure Logger pattern
validate method
Validate service
validateSecurityContext method
validateSecurityToken method
Validation
Validation in security patterns
Validation in security patterns, Business tier
Validation in security patterns, Intercepting Validator [See Intercepting Validator pattern]
Validation in security patterns, Policy Delegate
Validation in security patterns, Secure Base Action
Validation in security patterns, Secure Service Facade
Validation in security patterns, Web services
Validation in security patterns, Web tier
Validation, certificate chains
Validation, failures
Validation, in case study
Validation, Liberty Phase 1
Validation, X-KISS
Validation, XML signatures
Variables in Java
Vendor-independent security
Vendor-neutral credential handler
Vendor-specific security
Vendor-specific security, session management
Vendor-specific security, Web services APIs
Vendors
Vendors, password management
Vendors, service provisioning
Verification
Verification, biometric
Verification, certificate chains
Verification, host name
Verification, jar files
Verification, signatures 2nd
Verification, Web tier patterns
verify method
VeriSign CA 2nd
Version numbers in XACML
Vertical scalability in J2EE network topology
viewResult method
Virtual machines
virtual machines, CVM
virtual machines, JVM
virtual machines, KVM
VLANs
Voice verification
VPN access
Vulnerabilities, Web services
Watermarking Java code
Weakest links
Web
Web browser SSO Profile
Web of trust models
Web services definition language (WSDL) 2nd 3rd 4th
Web Services Interoperability Organization (WS-I)
Web Services Policy Framework (WS-Policy)
Web services policy language (WSPL)
Web services tier 2nd 3rd
Web services tier in case study 2nd 3rd 4th
Web services tier in J2EE
Web services tier in Liberty Alliance 2nd
Web services tier, architecture and building blocks
Web services tier, communication styles
Web services tier, core issues
Web services tier, infrastructure
Web services tier, Java-based providers
Web services tier, message-layer security
Web services tier, network-layer security
Web services tier, operational model
Web services tier, policies 2nd 3rd
Web services tier, protocols stack
Web services tier, references
Web services tier, requirements
Web services tier, SAML in
Web services tier, security patterns 2nd 3rd
Web services tier, security patterns, best practices
Web services tier, security patterns, factor analysis
Web services tier, security patterns, Message Inspector
Web services tier, security patterns, Message Interceptor Gateway
Web services tier, security patterns, pitfalls
Web services tier, security patterns, references
Web services tier, security patterns, Secure Message Router
Web services tier, standards 2nd
Web services tier, standards, WS-Security [See WS-Security]
Web services tier, standards, XML [See XML (Extensible Markup Language)]
Web services tier, summary
Web services tier, Transport-Layer Security
Web services tier, WS-I security profile
Web tier
Web tier in case study 2nd 3rd
Web tier in J2EE 2nd
Web tier in J2EE, authentication
Web tier in J2EE, authorization
Web tier in J2EE, context propagation from
Web tier in J2EE, HTTP session tracking
Web tier, container managed security strategy
Web tier, reality checks for
Web tier, security patterns 2nd 3rd
Web tier, security patterns, Authentication Enforcer
Web tier, security patterns, Authorization Enforcer
Web tier, security patterns, best practices
Web tier, security patterns, factor analysis
Web tier, security patterns, Intercepting Validator
Web tier, security patterns, Intercepting Web Agent
Web tier, security patterns, references
Web tier, security patterns, Secure Base Action
Web tier, security patterns, Secure Logger
Web tier, security patterns, Secure Pipe
Web tier, security patterns, Secure Service Proxy
Web, application load-balancing
Web, authentication
Web, redirection
Web, servers
Web, servers in SSL
Web, servers in use cases
Web, servers, Web tier patterns
web, services [See Web services tier]
Web, validation
Web, Web tier patterns [See Web tier]
Web, Web-based transactions [See Secure Pipe pattern]
Web.xml file
Web.xml file, basic HTTP authentication entry
Web.xml file, client certificate based authentication entry
Web.xml file, deployment descriptor
Web.xml file, form based authentication entry
WebAgent class
WebAgent class in case study
WebAgent class, Single Sign-on Delegator pattern 2nd
Wheel edge in Security Wheel
Where in security
Which in security
White box testing
White box testing in case study
White box testing, Secure UP 2nd 3rd
Who in security
Why in security
Wireless Toolkit (WTK) 2nd
Wireless Transport Layer Security (WTLS)
Workflow engine
WorkflowRecipient class
wrap method 2nd
WriteAppletPolicy.policy file
WriteFileApplet.html file
WriteFileApplet.java file 2nd
WS-I (Web Services Interoperability Organization)
WS-I Security profiles
WS-Policy (Web Services Policy Framework)
WS-Security
WS-Security in JWSDP
WS-Security, definitions
WS-Security, encryption 2nd
WS-Security, motivation
WS-Security, namespaces
WS-Security, SAML and REL in
WS-Security, signatures
WS-Security, SOAP messages
WS-Security, tokens
WSDL (Web Services Definition Language) 2nd 3rd 4th
WSPL (Web services policy language)
WTK (Wireless Toolkit) 2nd
WTLS (Wireless Transport Layer Security)
X-BULK
X-KISS (XML key information services)
X-KISS (XML key information services), locate service
X-KISS (XML key information services), validate service
X-KRSS (XML key registration service)
X-KRSS (XML key registration service), recovery
X-KRSS (XML key registration service), registration
X-KRSS (XML key registration service), reissue
X-KRSS (XML key registration service), revocation
X.500/LDAP Profile
X.509 certificates [See Certificates and certificate keys]
X509v3CertToken
XACML (Extensible Access Control Markup Language)
XACML kit 2nd
XACML Profile
XACML, access control and policy management
XACML, architecture
XACML, data flow
XACML, usage scenarios
XACML, usage scenarios, ebXML registry
XACML, usage scenarios, policy centralization
XACML, usage scenarios, policy stores
XACML, usage scenarios, SAML collaboration
XACML, usage scenarios, sample policy
XACML, usage scenarios, sample requests
XACML, usage scenarios, sample scenario
XACML, usage scenarios, XACML 2.0 with SAML 2.0
XACML, usage scenarios, XACML Kit
XACML, vs. EPAL
XACML, WSPL from
XACML, XACML 2.0
XACML, XML schema definition
XCBF (XML Common Biometric Format)
XKMS (XML key management system) 2nd
XKMS, issues
XKMS, motivation
XKMS, specification overview
XKMS, Verisign services
XKMS, X-BULK
XKMS, X-KISS
XKMS, X-KISS, locate service
XKMS, X-KISS, validate service
XKMS, X-KRSS [See X-KRSS (XML key registration service)]
XLST transform algorithms
XML (Extensible Markup Language)
XML Common Biometric Format (XCBF)
XML Denial of Service (XML-DOS) attacks
XML Digital Signature algorithm
XML in J2EE
XML in Message Inspector pattern
XML in Message Interceptor Gateway pattern
XML key information services (X-KISS)
XML key information services (X-KISS), locate service
XML key information services (X-KISS), validate service
XML key management system [See XKMS (XML key management system)]
XML key registration service (X-KRSS)
XML key registration service (X-KRSS), recovery
XML key registration service (X-KRSS), registration
XML key registration service (X-KRSS), reissue
XML key registration service (X-KRSS), revocation
XML messaging provider strategy
XML Schemas 2nd
XML Schemas in Message Inspector pattern
XML Schemas in Message Interceptor Gateway pattern
XML Schemas, for XACML
XML, encryption
XML, encryption, algorithms
XML, encryption, anatomy
XML, encryption, arbitrary content
XML, encryption, element level
XML, encryption, example scenarios
XML, encryption, motivation
XML, encryption, super encryption
XML, firewalls
XML, firewalls for performance
XML, firewalls for Web Services
XML, signatures
XML, signatures, algorithms
XML, signatures, anatomy
XML, signatures, Assertion Builder pattern
XML, signatures, creating
XML, signatures, examples
XML, signatures, in SAML
XML, signatures, motivation
XML, signatures, verifying and validating
XML, XACML for
XML-aware security
XML-aware security, infrastructure
XML-aware security, Message Inspector pattern
XML-aware security, Message Interceptor Gateway pattern
Xpath transform algorithms
XrML (Extensible Rights Markup Language)
XSS (cross-site scripting)
Xverify command
Yarrow random number generator
Zero knowledge testing
Zimmerman, Phil
Реклама