Авторизация
Поиск по указателям
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Авторы: Steel Ch., Nagappan R., Lai R.
Аннотация: For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.
Язык:
Рубрика: Технология /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Год издания: 2005
Количество страниц: 1088
Добавлена в каталог: 19.08.2007
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
HTTP
HTTP, basic authentication 2nd 3rd
HTTP, digest authentication
HTTP, POST messages
HTTP, POST messages, identity management
HTTP, POST messages, SAML 2nd
HTTP, POST messages, Web tier patterns
HTTP, redirection
HTTP, sessions
HTTP, sessions in Web tier patterns
HTTP, sessions, cookies and URL rewriting in
HTTPS (HTTP over SSL)
HTTPS (HTTP over SSL) for Web services
HTTPS (HTTP over SSL), J2EE 2nd 3rd 4th
HTTPSClientUsingProxyTunnel.java program
HTTPServletRequest objects 2nd
HttpsUrlConnection class
Hub in Security Wheel
I/O, non-blocking
ID-FF (Identity Federated Framework) version 1.2
ID-SIS (Identity Service Interface Specification) version
ID-WSF (Identity Web Services Framework) version
IDEA symmetric cipher
Identification processes
Identity Federated Framework (ID-FF) version 1.2
Identity federation 2nd 3rd
Identity federation, cross-domain
Identity federation, Liberty Alliance
Identity federation, SAML
Identity management 2nd 3rd 4th
Identity management in case study 2nd
Identity management in use cases
Identity management, access control [See Access control]
Identity management, access management services
Identity management, auditing 2nd 3rd
Identity management, core issues
Identity management, data synchronization services
Identity management, directory services
Identity management, importance
Identity management, justifying
Identity management, Liberty Alliance Project [See Liberty Alliance Project]
Identity management, network identity
Identity management, personal identification [See Personal identification]
Identity management, point-to-point interfaces for
Identity management, policies
Identity management, provisioning services
Identity management, references 2nd
Identity management, reporting services
Identity management, SAML [See SAML (Security Assertion Markup Language)]
Identity management, security patterns for 2nd 3rd
Identity management, security patterns for Assertion Builder
Identity management, security patterns for best practices
Identity management, security patterns for Credential Tokenizer
Identity management, security patterns for factor analysis
Identity management, security patterns for Password Synchronizer
Identity management, security patterns for pitfalls
Identity management, security patterns for references
Identity management, security patterns for Single Sign-on Delegator
Identity management, security patterns for Web services
Identity management, service provisioning relationship
Identity management, services for
Identity management, single sign-on [See Single sign-on (SSO) mechanisms]
Identity management, summary 2nd
Identity management, XACML [See XACML (Extensible Access Control Markup Language)]
Identity Provider Agent strategy
Identity Provider Discovery Profile
Identity providers
Identity providers, in case study
Identity providers, Liberty Alliance
Identity providers, Liberty specifications
Identity providers, Message Inspector pattern
Identity providers, Message Interceptor Gateway pattern
Identity providers, Secure Message Router pattern
Identity providers, Single Sign-on Delegator pattern 2nd
Identity providers, user account provisioning
Identity providers, Web services
Identity Service Interface Specification (ID-SIS) version
Identity termination strategy
Identity theft and spoofing
Identity theft and spoofing, Assertion Builder pattern
Identity theft and spoofing, Web services
Identity Web Services Framework (ID-WSF) version
IDSs (Intrusion Detection Systems)
IETF Policy Management Working Group
IMAP (Internet Message Access Protocol)
Impact risk factor
implementation
Implementation, Assertion Builder pattern
Implementation, AssertionContextImpl class
Implementation, biometrics
Implementation, JAAS authorization
Implementation, LoginModule class
Implementation, Policy Delegate pattern
Implementation, Secure UP 2nd
Implementation, smart cards
Implementation, SPML
Implementation, UserNameTokem class
implies method
Importing certificates 2nd
Inclusive canonicalization encryption
Information aggregators
Informative policies
Infrastructure
Infrastructure in case study 2nd 3rd
Infrastructure in security patterns
Infrastructure in security patterns, Business tier
Infrastructure in security patterns, factor analysis
Infrastructure in security patterns, Intercepting Web Agent
Infrastructure in security patterns, Password Synchronizer
Infrastructure in security patterns, Secure Pipe
Infrastructure in security patterns, Web services 2nd
Infrastructure in security patterns, Web tier
Infrastructure, Application Security Provider
Infrastructure, J2EE
Infrastructure, policies
Infrastructure, Security Services
init method
init method, AuditClient
init method, Cipher
init method, HTTPProxy
init method, MBeanFactory
init method, MBeanManager
init method, PasswordSyncLedger
init method, PasswordSyncListener
init method, Policy Delegate pattern
init method, SimpleSOAPServiceSecurePolicy
init method, TakeAction
init method, WriteFileApplet
initConfig method
initConfig method, ServiceConfig
initConfig method, SSODelegatorFactoryImpl
Initialize method
initialize method, KeyPairGenerator
initialize method, LoginModule
initSign method
initVerify method
Injection flaws
Input validation failures
Insider attacks
Integration and Integration tier
Integration and Integration tier in case study
Integration and Integration tier in identity management
Integration and Integration tier in patterns-driven design
Integration and Integration tier in security patterns
Integration and Integration tier in security patterns, Assertion Builder
Integration and Integration tier in security patterns, Intercepting Web Agent 2nd
Integration and Integration tier in security patterns, Password Synchronizer
Integration and Integration tier in security patterns, Secure Service Facade
Integration and Integration tier in security patterns, Secure Service Proxy
Integration and Integration tier, J2EE
Integration and Integration tier, reality checks
Integration and Integration tier, rule-based
Integration and Integration tier, user account provisioning
Integrity
Integrity as security goal
Integrity in Security Wheel
Integrity, Secure Pipe pattern 2nd
Integrity, Web services
intellectual property
Intercepting Filter pattern
Intercepting Filter pattern and Audit Interceptor pattern
Intercepting Filter pattern and Authentication Enforcer pattern
Intercepting Filter pattern and Intercepting Validator pattern
Intercepting Validator pattern
Intercepting Validator pattern and Secure Base Action pattern 2nd
Intercepting Validator pattern in case study 2nd 3rd 4th 5th
Intercepting Validator pattern, consequences
Intercepting Validator pattern, forces
Intercepting Validator pattern, participants and responsibilities 2nd
Intercepting Validator pattern, problem
Intercepting Validator pattern, reality check
Intercepting Validator pattern, related patterns
Intercepting Validator pattern, security factors and risks
Intercepting Validator pattern, solution
Intercepting Validator pattern, strategies
Intercepting Validator pattern, structure
Intercepting Web Agent pattern
Intercepting Web Agent pattern in case study
Intercepting Web Agent pattern, consequences
Intercepting Web Agent pattern, forces
Intercepting Web Agent pattern, participants and responsibilities
Intercepting Web Agent pattern, problem
Intercepting Web Agent pattern, reality check
Intercepting Web Agent pattern, related patterns
Intercepting Web Agent pattern, related patterns, Container Managed Security
Intercepting Web Agent pattern, related patterns, Secure Service Proxy
Intercepting Web Agent pattern, sample code
Intercepting Web Agent pattern, security factors and risks
Intercepting Web Agent pattern, solution
Intercepting Web Agent pattern, strategies
Intercepting Web Agent pattern, structure
Intercepting Web Agent strategy
Interceptor strategy
Interfaces
Interfaces, CertPath
Interfaces, JAAS
Interfaces, JCA
Interfaces, JCE
Interfaces, JSSE
Interfaces, Password Synchronizer pattern
Interfaces, PKCS#11 and PKCS#15 standards
Interfaces, Policy Delegate pattern
Interfaces, Secure Service Facade pattern
Intermediary infrastructure
Internet Message Access protocol (IMAP)
Internet Scanner testing tool
Interoperability
Interoperability, Liberty Phase 1
Interoperability, Secure Message Router pattern
Interoperability, Secure Pipe pattern
Interoperability, security provisioning patterns
Interoperability, user account provisioning
Interoperability, Web services
Intrusion Detection Systems (IDSs)
Invalid data [See Intercepting Validator pattern]
Invalidating HTTP sessions
Invocation, rule-based
Invoke method
IP address capture
IP filtering
Iris verification
isAuthorized method
isCallerInRole method
isCallerInRole method, EJBContext
isCallerInRole method, J2EE authorization
Issuing authority in SAML
isUserInRole method 2nd 3rd
isValidStatement method
Iterative development in Secure UP
ITS4 testing tool
J2EE (Java 2 Enterprise Edition) platform
J2EE (Java 2 Enterprise Edition) platform for biometrics 2nd
J2EE (Java 2 Enterprise Edition) platform for smart cards
J2EE (Java 2 Enterprise Edition) platform for Web services 2nd
J2EE (Java 2 Enterprise Edition) platform, architecture and logical tiers
J2EE (Java 2 Enterprise Edition) platform, authorization 2nd 3rd
J2EE (Java 2 Enterprise Edition) platform, authorization, declarative
J2EE (Java 2 Enterprise Edition) platform, authorization, programmatic
J2EE (Java 2 Enterprise Edition) platform, authorization, web-tier
J2EE (Java 2 Enterprise Edition) platform, clients 2nd 3rd
J2EE (Java 2 Enterprise Edition) platform, component security [See Component security]
J2EE (Java 2 Enterprise Edition) platform, container-based security [See Container-based security]
J2EE (Java 2 Enterprise Edition) platform, definitions in
J2EE (Java 2 Enterprise Edition) platform, EIS tier 2nd
J2EE (Java 2 Enterprise Edition) platform, EIS tier, connector architecture in
J2EE (Java 2 Enterprise Edition) platform, EIS tier, JDBC in
J2EE (Java 2 Enterprise Edition) platform, EIS tier, JMS in
J2EE (Java 2 Enterprise Edition) platform, EJB tier [See EJB tier in J2EE]
J2EE (Java 2 Enterprise Edition) platform, infrastructure
J2EE (Java 2 Enterprise Edition) platform, LDAP in
J2EE (Java 2 Enterprise Edition) platform, network topology
J2EE (Java 2 Enterprise Edition) platform, network topology, horizontal scalability
J2EE (Java 2 Enterprise Edition) platform, network topology, vertical scalability
J2EE (Java 2 Enterprise Edition) platform, references
J2EE (Java 2 Enterprise Edition) platform, SAML in
J2EE (Java 2 Enterprise Edition) platform, security patterns for
J2EE (Java 2 Enterprise Edition) platform, summary
J2ME (Java 2 Micro Edition)
J2ME (Java 2 Micro Edition), architecture
J2ME (Java 2 Micro Edition), configurations
J2ME (Java 2 Micro Edition), MIDlets in
J2ME (Java 2 Micro Edition), profiles
J2SE (Java 2 Standard Edition)
J2SE (Java 2 Standard Edition) in Obfuscated Transfer Object pattern
J2SE (Java 2 Standard Edition), J2SE 5.0
JAAS (Java Authentication and Authorization Service)
JAAS Authorization policy file
JAAS for biometrics
JAAS Module
JAAS vs. JGSS
JAAS, authentication
JAAS, authentication in clients
JAAS, authentication, LoginModule 2nd 3rd
JAAS, authentication, Web tier
JAAS, authorization
JAAS, authorization, implementing
JAAS, authorization, strategy
JAAS, classes and interfaces
JAAS, client-side callbacks
JACC (Java Authorization Contract for Containers) 2nd
JAD (Java application descriptor) files
JADTool utility
JAR (Java archive format) files
JAR (Java archive format) files in Web tier patterns
JAR (Java archive format) files, for signed applets
JAR (Java archive format) files, signing
JAR (Java archive format) files, verifying
Jarsigner tool
Jarsigner tool for signed applets
Jarsigner tool for smart cards
Java 2 Enterprise Edition) platform [See J2EE (Java 2 Enterprise Edition) platform]
Java 2 Micro Edition (J2ME)
Java 2 Micro Edition (J2ME), architecture
Java 2 Micro Edition (J2ME), configurations
Java 2 Micro Edition (J2ME), MIDlets in
Java 2 Micro Edition (J2ME), profiles
Java 2 platform security 2nd
Java 2 platform security, applet security
Java 2 platform security, applet security for smart cards
Java 2 platform security, applet security, Java Card
Реклама