Авторизация
Поиск по указателям
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Авторы: Steel Ch., Nagappan R., Lai R.
Аннотация: For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.
Язык:
Рубрика: Технология /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Год издания: 2005
Количество страниц: 1088
Добавлена в каталог: 19.08.2007
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
Case study, overview
Case study, pitfalls
Case study, references
Case study, risk analysis and mitigation
Case study, security patterns 2nd
Case study, summary
Case study, trade-off analysis
Case study, use cases [See Use cases]
Caslon Analytics Privacy Guide
Catalog service 2nd
Catalogs, security pattern
CBEFF (Common Biometric Exchange File Format)
CDC (Connected Device Configuration)
CDSSO (cross-domain SSO)
CDSSO (cross-domain SSO) in identity management
CDSSO (cross-domain SSO) in Liberty Alliance
Centralization
Centralization, auditing
Centralization, authentication
Centralization, Authorization Enforcer pattern
Centralization, encryption
Centralization, logging 2nd
Centralization, Message Interceptor Gateway pattern
Centralization, policies 2nd
Centralization, routing
Centralization, transaction management
Centralization, validations
Centralization, Web services patterns
Centralized model in user account provisioning
CER (Crossover Error Rate) probability
certificate revocation lists (CRLs)
Certificate Signing Requests (CSRs) 2nd
CertificateFactory class 2nd
Certificates and certificate keys 2nd
Certificates and certificate keys, CA role
Certificates and certificate keys, certificate chains
Certificates and certificate keys, for applets
Certificates and certificate keys, for JAD files
Certificates and certificate keys, for keytool
Certificates and certificate keys, for SSL
Certificates and certificate keys, importing 2nd
Certificates and certificate keys, in JSSE mutual authentication
Certificates and certificate keys, PKI
Certificates and certificate keys, printing
Certificates and certificate keys, revocation 2nd
Certificates and certificate keys, Secure Pipe pattern
Certificates and certificate keys, security pattern factor analysis
Certificates and certificate keys, tokens 2nd
Certificates and certificate keys, Web tier patterns
Certificates of Authority (CAs)
Certificates of Authority (CAs) for certificates
Certificates of Authority (CAs) for certificates, issuing
Certificates of Authority (CAs) for certificates, revoking
Certificates of Authority (CAs) for signed applets
Certificates of Authority (CAs), CertPath
Certificates of Authority (CAs), J2EE
CertPath
CertPath for certificate chains
CertPath, classes and interfaces in
CertPathBuilder class
CertPathValidator class
CertStore class
CGI in Web tier patterns
Challenge-response protocol authentication
Change management request (CMR) system
ChangeCipherSpec messages 2nd
Check Point patterns
checkPermission method
checkRead method
Child nodes in attack trees
Children's Online Privacy Protection Act (COPPA)
CIM (Common Information Model)
Cipher class
Cipher class in JCE 2nd
Cipher class in Secure Logger pattern
CipherInputStream class
CipherOutputStream class
ciphers
Ciphers, asymmetric
Ciphers, JCE
Ciphers, JCE, block
Ciphers, JCE, stream
Ciphers, symmetric
CipherState messages
Circles of trust
Circles of trust in Liberty specifications
Circles of trust in Single Sign-on Delegator pattern
Claims in WS-Security
Class diagrams for security patterns
Class diagrams for security patterns, Assertion Builder
Class diagrams for security patterns, Audit Interceptor
Class diagrams for security patterns, Authentication Enforcer
Class diagrams for security patterns, Authorization Enforcer
Class diagrams for security patterns, Container Managed Security
Class diagrams for security patterns, Credential Tokenizer
Class diagrams for security patterns, Dynamic Service Management
Class diagrams for security patterns, Intercepting Validator
Class diagrams for security patterns, Intercepting Web Agent
Class diagrams for security patterns, JAAS Login Module strategy
Class diagrams for security patterns, MBean strategy
Class diagrams for security patterns, Message Inspector
Class diagrams for security patterns, Message Interceptor Gateway
Class diagrams for security patterns, Obfuscated Transfer Object
Class diagrams for security patterns, Password Synchronizer
Class diagrams for security patterns, Policy Delegate
Class diagrams for security patterns, Secure Base Action
Class diagrams for security patterns, Secure Logger
Class diagrams for security patterns, Secure Message Router
Class diagrams for security patterns, Secure Pipe
Class diagrams for security patterns, Secure Service Facade
Class diagrams for security patterns, Secure Service Proxy
Class diagrams for security patterns, Secure Session Object
Class diagrams for security patterns, Single Sign-on Delegator
Classes
Classes in case study
Classes, CertPath
Classes, JAAS
classes, Java
Classes, JCA
Classes, JCE
Classes, JSSE
Classification of security patterns
ClassLoader
CLDC (Connected Limited Device Configuration)
Client Device tier, reality checks for
Client-certificate authentication
Client-certificate authentication in web.xml
Client-certificate authentication, Authentication Enforcer pattern
Client-certificate authentication, J2EE
ClientHello messages
ClientKeyExchange messages
Clients
Clients in case study
Clients in security patterns
Clients in security patterns, Assertion Builder
Clients in security patterns, Audit Interceptor
Clients in security patterns, Authentication Enforcer
Clients in security patterns, Container Managed Security
Clients in security patterns, Credential Tokenizer
Clients in security patterns, Intercepting Validator
Clients in security patterns, Intercepting Web Agent
Clients in security patterns, Message Inspector
Clients in security patterns, Message Interceptor Gateway
Clients in security patterns, Obfuscated Transfer Object
Clients in security patterns, Password Synchronizer
Clients in security patterns, Policy Delegate 2nd
Clients in security patterns, Secure Base Action
Clients in security patterns, Secure Logger
Clients in security patterns, Secure Message Router
Clients in security patterns, Secure Pipe
Clients in security patterns, Secure Service Proxy
Clients in security patterns, Secure Session Object
Clients in security patterns, Single Sign-on Delegator 2nd
Clients, Identity Provider Agent strategy
Clients, J2EE 2nd 3rd
Clients, JAAS authentication for
Clients, JSSE
Clients, Liberty specifications
Clients, SAML
Clients, SASL 2nd
Clients, server connections 2nd
Clients, use cases
closeService method 2nd
closeSSOConnection method
Clustered PEP pattern
CMR (change management request) system
code, Java
code, Java, obfuscation
code, Java, reverse engineering
Codebase in Java 2
CodeSource in Java 2
Coding problems
Cold Standby pattern
Collisions in one-way hash functions
Command APDUs
commit method
commit method, LoginModule
commit method, SAML
commitTransactions method
Common Biometric Exchange File Format (CBEFF)
Common classes in JAAS
Common Information Model (CIM)
Common Open Policy Service (COPS)
Common SAML functions
Communication
Communication, biometrics
Communication, JGSS
Communication, Liberty Alliance
Communication, Web services 2nd
Communication, Web tier patterns
Compact Virtual Machine (CVM)
Comparator-checked Fault Tolerant System pattern
Compatibility
Compatibility in proprietary systems
Compatibility in Secure Pipe pattern
Compiling applets
complexity
Complexity, Assertion Builder pattern
Complexity, Authorization Enforcer pattern
Complexity, personal identification systems
Complexity, Policy Delegate pattern 2nd
Complexity, Secure Pipe pattern
Compliance
Compliance in other countries
Compliance in Security Wheel
Compliance in Web services patterns
Compliance, COPPA
Compliance, Data Protection Directive
Compliance, Gramm-Leach-Bliley Act
Compliance, HIPPA
Compliance, justifications
Compliance, Notice of Security Breach
Compliance, Sarbanes-Oxley Act
Component security
Component security, Business tier patterns
Component security, J2EE
Component security, J2EE, authentication
Component security, J2EE, authorization
Component security, J2EE, context propagation
Component security, J2EE, HTTP session tracking
Component security, J2EE, users, groups, roles, and realms
Component security, J2EE, Web tier
Component-managed sign-on
Composability issues
Computer Security Institute survey
Conceptual security model
Concurrency
Concurrency, Message Inspector pattern
Concurrency, Secure Session Object pattern
conditions
Conditions, Parlay
Conditions, policy design
Conditions, SAML assertions
Confidentiality 2nd
Confidentiality in security patterns
Confidentiality in security patterns, Assertion Builder
Confidentiality in security patterns, Authentication Enforcer
Confidentiality in security patterns, Dynamic Service Management
Confidentiality in security patterns, Message Inspector
Confidentiality in security patterns, Obfuscated Transfer Object
Confidentiality in security patterns, Policy Delegate
Confidentiality in security patterns, Secure Logger
Confidentiality in security patterns, Secure Pipe
Confidentiality, breaches
Confidentiality, Security Wheel
Confidentiality, Web services 2nd
Configuration
Configuration class
Configuration, Assertion Builder pattern
Configuration, in case study
Configuration, insecure
Configuration, J2ME
Configuration, Web services patterns
Conformance requirements
Connected Device Configuration (CDC)
Connected Limited Device Configuration (CLDC)
Connections
Connections in case study
Connections in use cases
Connections, client-server 2nd
Connections, SSL 2nd
Connector architecture (CA)
Connector Factory
Consequences in security patterns
Consequences in security patterns, Assertion Builder
Consequences in security patterns, Audit Interceptor
Consequences in security patterns, Authentication Enforcer
Consequences in security patterns, Authorization Enforcer
Consequences in security patterns, Container Managed Security
Consequences in security patterns, Credential Tokenizer
Consequences in security patterns, Dynamic Service Management
Consequences in security patterns, Intercepting Validator
Consequences in security patterns, Intercepting Web Agent
Consequences in security patterns, Message Inspector
Consequences in security patterns, Message Interceptor Gateway
Consequences in security patterns, Obfuscated Transfer Object
Consequences in security patterns, Password Synchronizer
Consequences in security patterns, Policy Delegate
Consequences in security patterns, Secure Base Action
Consequences in security patterns, Secure Logger 2nd
Consequences in security patterns, Secure Message Router
Consequences in security patterns, Secure Pipe
Consequences in security patterns, Secure Service Facade
Consequences in security patterns, Secure Service Proxy
Consequences in security patterns, Secure Session Object
Consequences in security patterns, Single Sign-on Delegator
Constants in Java System Access Manager
Constraints
Constraints in use cases
Constraints, authorization
Contact cards
Container authenticated strategy
Container Managed Security pattern
Container Managed Security pattern, consequences
Container Managed Security pattern, forces
Container Managed Security pattern, participants and responsibilities
Container Managed Security pattern, problem
Container Managed Security pattern, reality check
Container Managed Security pattern, related patterns
Container Managed Security pattern, sample code
Реклама