Авторизация
Поиск по указателям
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Авторы: Steel Ch., Nagappan R., Lai R.
Аннотация: For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.
Язык:
Рубрика: Технология /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Год издания: 2005
Количество страниц: 1088
Добавлена в каталог: 19.08.2007
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
Encryption and cryptography, signatures in [See Signatures]
Encryption and cryptography, SSL in
Encryption and cryptography, symmetric ciphers
Encryption and cryptography, TLS in
Encryption and cryptography, weak
Encryption and cryptography, Web services patterns 2nd 3rd
Encryption and cryptography, Web tier patterns
Encryption and cryptography, WS-Security 2nd
Encryption and cryptography, XML [See XML (Extensible Markup Language)]
EncryptionHelper class
Encryptor class
End-to-end transport layer security
Endpoints in case study
Engine classes
Engine classes, JCA
Engine classes, JCE
Enhanced Client and Proxy (ECP) profile
Enrollment systems
Enrollment systems, biometrics 2nd
Enrollment systems, smart card 2nd
Enterprise Java Beans (EJBs)
Enterprise Java Beans (EJBs), Container Managed Security pattern
Enterprise Java Beans (EJBs), declarative security for
Enterprise Java Beans (EJBs), for programmatic security
Enterprise Java Beans (EJBs), helper classes in
Enterprise Java Beans (EJBs), in case study
Enterprise Privacy Authorization Language (EPAL)
Enterprise-information system (EIS) tier 2nd
Enterprise-information system (EIS) tier, connector architecture in
Enterprise-information system (EIS) tier, JDBC in
Enterprise-information system (EIS) tier, JMS in
EnterpriseService class
Entitlement in Web services
Entity management
Enveloped Signature transform algorithms
Enveloped signatures
Envelopes in SOAP messages
Enveloping signatures
Enveloping signatures, examples
Enveloping signatures, XML
Environment setup in Secure UP
EPAL (Enterprise Privacy Authorization Language)
EPCGlobal standards
EPCs (Electronic Product Codes)
Equal Error Rate (EER) probability
ERewards Membership Service [See Case study]
Errors and error handling
Errors and error handling, improper
Errors and error handling, reporting
Errors and error handling, SPML
Errors and error handling, translation
European Union (EU) Data Protection Directive
EventCatalog class
Exclusive canonicalization encryption
execute method
execute method, Policy Delegate pattern
execute method, PolicyDelegateInterface
execute method, Secure Base Action pattern
execute method, SecureSessionFacadeSessionBean
executeAsPrivileged method
expertise
Expertise, Message Interceptor Gateway pattern
Expertise, problems in
Exporting
Exporting, keystore certificates
Exporting, policies for
Exposure risk factor
Extended SPML operations
extensibility
Extensibility, Message Inspector pattern
Extensibility, Message Interceptor Gateway pattern
Extensibility, Secure Logger pattern
Extensibility, Secure Message Router pattern
Extensibility, SPML
Extensibility, user account provisioning 2nd
Extensible Access Control Markup Language [See XACML (Extensible Access Control Markup Language)]
Extensible Markup Language [See XML (Extensible Markup Language)]
Extensible Rights Markup Language (XrML)
External policy server strategy
Extract Adapter pattern
Facial recognition
Factor analysis
Factor analysis for security patterns
Factor analysis in case study
Factory pattern
failover
Failover, J2EE network topology
Failover, service
Failure to Enroll (FTE) probability
False Acceptance Rate (FAR) probability 2nd
False Match Rate (FMR) probability
False Non-Match Rate (FNMR) probability
False Reject Rate (FRR) probability 2nd
FAR (False Acceptance Rate) probability 2nd
Fault handling
Fault tolerance
Fault tolerance, J2EE network topology
Fault tolerance, Message Interceptor Gateway pattern
Fault tolerance, Secure Message Router pattern
Fault tolerance, Web services patterns
FBI survey
Federal regulations 2nd
Federal Trade Commission survey
Federated affiliates
Federated data exchange
Federated identity 2nd
Federated SSO 2nd
Federation management in Liberty Alliance
Federation services
Federation termination protocol
Federations, cross-domain
fileChanged method
Final classes in Java
Financial losses
Financial losses, from confidentiality breaches
Financial losses, reported
Financial Privacy Rule
Financial Services Modernization Act
findApplicationId method
Fine-grained security
Fingerprint matching
Fingerprint matching, approaches to
Fingerprint matching, logical architecture
Fingerprints, key
Finished messages
Firewalls
Firewalls for Java Card applets
Firewalls, DMZs for
Firewalls, Secure Service Proxy pattern
Firewalls, Web services patterns
Firewalls, Web tier patterns
Firewalls, XML 2nd
Flag values in JAAS 2nd
Flexibility in security patterns
Flexibility in security patterns, Intercepting Web Agent
Flexibility in security patterns, Secure Base Action
Flexibility in security patterns, Secure Service Proxy
Flexibility in security patterns, Single Sign-on Delegator
FMR (False Match Rate) probability
FNMR (False Non-Match Rate) probability
Forces in security pattern templates
Forces in security pattern templates, Assertion Builder
Forces in security pattern templates, Audit Interceptor
Forces in security pattern templates, Authentication Enforcer
Forces in security pattern templates, Authorization Enforcer
Forces in security pattern templates, Container Managed Security
Forces in security pattern templates, Credential Tokenizer
Forces in security pattern templates, Dynamic Service Management
Forces in security pattern templates, Intercepting Validator
Forces in security pattern templates, Intercepting Web Agent
Forces in security pattern templates, Message Inspector
Forces in security pattern templates, Message Interceptor Gateway
Forces in security pattern templates, Obfuscated Transfer Object
Forces in security pattern templates, Password Synchronizer
Forces in security pattern templates, Policy Delegate
Forces in security pattern templates, Secure Base Action
Forces in security pattern templates, Secure Logger
Forces in security pattern templates, Secure Message Router
Forces in security pattern templates, Secure Pipe
Forces in security pattern templates, Secure Service Facade
Forces in security pattern templates, Secure Service Proxy
Forces in security pattern templates, Secure Session Object
Forces in security pattern templates, Single Sign-on Delegator
Form validation
Form validation in XML using Apache Struts
Form validation, Web tier patterns
Form-based authentication
Form-based authentication in web.xml
Form-based authentication, J2EE 2nd
Form-POST-based redirection
Foundstone Enterprise testing tool
Fowler, Martin
Frameworks, security
Frameworks, security in Secure Service Facade pattern
Frameworks, security, adopting
Front Controller pattern 2nd 3rd
FRR (False Reject Rate) probability 2nd
FTE (Failure to Enroll) probability
Full View with Errors pattern
Gambling casino
Gang of Four (GoF) design patterns
Gartner Group report
gateways
Gateways, Message Interceptor Gateway pattern [See Message Interceptor Gateway pattern]
Gateways, Parlay
generateKey method
Generic products, XACML for
genKeyPair method
genPrivate method
genPublic method
getAction method
getAlgorithm method
getAllConfigContext method
getApplicationBufferSize method
getAssertionReply method
getAuthenticationMethod method
getCallerPrincipal method 2nd
getCallersIdentity method
getConfigFile method
getConfigProperties method
getConnection method
getContents method
getContext method
getData method
getEncoded method
getFormat method
getInstance method
getInstance method, Cipher
getInstance method, KeyAgreement
getInstance method, KeyGenerator
getInstance method, KeyPairGenerator
getInstance method, MBeanFactory
getInstance method, MBeanManager
getInstance method, MessageDigest
getInstance method, Signature
getMaxInactiveInterval method
getPacketBufferSize method
getPermissions method
getPrincipal method
getProtectionDomain method
getProtocolBinding method
getProtocolBinding method, AssertionContextImpl
getProtocolBinding method, SSOContextImpl
getProtocolBinding method, TokenContextImpl
getRegistryFileName method
getRemoteUser method 2nd
getSecurityInfo method
getSecurityManager method
getServiceName method
getServiceStatus method
getSession method
getSessionInfo method
getSSODelegator method
getSSOTokenMap method
getStatus method
getSubject method
getToken method
getToken method, TokenContextImpl
getToken method, UsernameToken
getUserPrincipal method 2nd 3rd
GINA (Graphical Identification and Authentication)
GINA Module
GINA Module for biometrics
GINA Module for smart cards
GLB (Gramm-Leach-Bliley) Act
Global logout
Global logout in identity management
Global logout, Liberty Alliance
Global logout, SAML
Global Platform technology
Goals, security
GoF (Gang of Four) design patterns
Gramm-Leach-Bliley (GLB) Act
GRANT statement
Granularity
Granularity, Container Managed Security pattern
Granularity, Intercepting Web Agent pattern
Graphical Identification and Authentication (GINA)
groups
Groups, identity management
Groups, J2EE
GSS-API
HA [See High availability (HA)]
Hand geometry
handle method
handlers
Handshake messages
Hardening
Hardening in Web services patterns
Hardening in Web tier security
Hardware acceleration
Hardware cryptographic devices
Hardware cryptographic devices, Web services patterns
Hardware cryptographic devices, Web tier patterns
Headers in SOAP messages
Health Insurance Privacy and Portability Act (HIPPA) of 1996
helper classes
Helper classes, AuditInterceptor
Helper classes, EJB
Hierarchical resource profiles
High availability (HA)
High availability (HA) in case study
High availability (HA) in use cases
High availability (HA), Identity management patterns
High availability (HA), J2EE network topology
High availability (HA), Message Interceptor Gateway pattern
High availability (HA), Secure Message Router pattern
HIPPA (Health Insurance Privacy and Portability Act) of 1996
HMAC-MD5 algorithm
honeypots
Horizontal scaling
Horizontal scaling, Business tier patterns
Horizontal scaling, J2EE network topology
Host operating systems
Host security
Host security in case study
Host security in Web services patterns
Host security, using JSSE
HostnameVerifier class
Hot Standby pattern
Реклама