Авторизация
Поиск по указателям
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Авторы: Steel Ch., Nagappan R., Lai R.
Аннотация: For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.
Язык:
Рубрика: Технология /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Год издания: 2005
Количество страниц: 1088
Добавлена в каталог: 19.08.2007
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
Participants and responsibilities in security patterns, Credential Tokenizer
Participants and responsibilities in security patterns, Dynamic Service Management 2nd
Participants and responsibilities in security patterns, Intercepting Validator 2nd
Participants and responsibilities in security patterns, Intercepting Web Agent
Participants and responsibilities in security patterns, Message Inspector
Participants and responsibilities in security patterns, Message Interceptor Gateway
Participants and responsibilities in security patterns, Obfuscated Transfer Object
Participants and responsibilities in security patterns, Password Synchronizer
Participants and responsibilities in security patterns, Policy Delegate
Participants and responsibilities in security patterns, Secure Base Action 2nd
Participants and responsibilities in security patterns, Secure Logger
Participants and responsibilities in security patterns, Secure Message Router
Participants and responsibilities in security patterns, Secure Service Facade 2nd
Participants and responsibilities in security patterns, Secure Service Proxy
Participants and responsibilities in security patterns, Secure Session Object
Participants and responsibilities in security patterns, Single Sign-on Delegator
Partitioning in network topology
Passive RFID tags
Password Manager
Password Synchronizer Manager
Password Synchronizer pattern 2nd
Password Synchronizer pattern, consequences
Password Synchronizer pattern, forces
Password Synchronizer pattern, participants and responsibilities
Password Synchronizer pattern, problem
Password Synchronizer pattern, reality check
Password Synchronizer pattern, related patterns
Password Synchronizer pattern, sample code
Password Synchronizer pattern, security factors and risks
Password Synchronizer pattern, solution
Password Synchronizer pattern, strategies
Password Synchronizer pattern, structure
Password-Based Encryption (PRE)
Passwords
Passwords in authentication
Passwords, Credential Tokenizer patterns
Passwords, exploits
Passwords, Identity management 2nd
Passwords, JAAS authorization
Passwords, keystore
Passwords, SAML
Passwords, smart cards
passwords, synchronization 2nd [See also Password Synchronizer pattern]
Passwords, vendor products for
Passwords, Web tier patterns
PasswordSyncLedger class
PasswordSyncLedger class, notification messages from
PasswordSyncLedger class, sample code 2nd
PasswordSyncListener class
PasswordSyncListener class, sample code 2nd
PasswordSyncListener class, screen display messages from
PasswordSyncManager class 2nd 3rd
PasswordSyncRequest class 2nd 3rd
patches
Patches in Secure UP
Patches, problems from
Patterns, security [See Security patterns]
PBEWithMD5AndDES algorithm
PC/SC framework
PCKS providers
PDPs (policy decision points)
PDPs, SAML
PDPs, sample programs
PDPs, XACML 2nd
PDPs, XACML 2.0 with SAML 2.0
penetration tests
PEPs (Policy Enforcement Points)
PEPs, SAML 2nd
PEPs, XACML
PEPs, XACML 2.0 with SAML 2.0
Performance
Performance in security patterns
Performance in security patterns, Audit Interceptor 2nd
Performance in security patterns, Business tier
Performance in security patterns, Intercepting Validator
Performance in security patterns, Message Interceptor Gateway
Performance in security patterns, Obfuscated Transfer Object
Performance in security patterns, Policy Delegate
Performance in security patterns, Secure Logger 2nd
Performance in security patterns, Secure Pipe 2nd
Performance, helper classes for
Performance, J2EE network topology
Permission class 2nd
PermissionCollection class 2nd
PERMISSIONS
Permissions, J2EE
Permissions, Java 2
Permissions, JNLP
Permissions, MIDlets
Permissions, tag library for
Permissions, Web tier patterns
PermissionsCollection class
Persistent mode
Personal Data Ordinance
Personal Health Information (PHI)
Personal identification 2nd
Personal identification, authentication
Personal identification, best practices
Personal identification, biometric [See Biometric identification and authentication]
Personal identification, enabling technologies [See Enabling technologies for personal identification]
Personal identification, physical and logical access control
Personal identification, pitfalls
Personal identification, references
Personal identification, RFID-based
Personal identification, smart cards [See Smart cards]
PGP (Pretty Good Privacy)
PGP in PKI
PGP in trust models
PHI (Personal Health Information)
phishing
Physical access control 2nd
PINs for smart cards 2nd
Pipes
Pipes and Filters pattern
Pipes, Secure Pipe pattern [See Secure Pipe pattern]
Pipes, Web tier patterns
Pitfalls
Pitfalls in case study
Pitfalls in personal identification
Pitfalls in security patterns
Pitfalls in security patterns, Business tier
Pitfalls in security patterns, Identity management
Pitfalls in security patterns, security provisioning
Pitfalls in security patterns, Web services
PKCS#11 interface standard 2nd
PKCS#15 interface standard
PKCS1 algorithm
PKI (Public Key Infrastructure)
PKI in Security Wheel
PKI, limitations
PKI, Web tier patterns
PKI, XML
PKITS (Public Key Interoperability Test Suite)
PKIX
PKIXParameters class
Platforms in case study
Plug-ins
Plug-ins for biometrics
Plug-ins for smart cards
Plug-ins in Java System Access Manager
Pluggable Authentication Module (PAM) 2nd
Pluggable Authentication Module (PAM) for biometrics
Pluggable Authentication Module (PAM) for smart cards
Point-to-Point Channel pattern
Point-to-point interfaces
Pointers in Java
POJO business objects 2nd
policies
policies in case study
policies in security patterns
policies in security patterns, Business tier 2nd
policies in security patterns, Identity management
policies in security patterns, Intercepting Web Agent
policies in security patterns, Secure Service Facade
policies in security patterns, Web tier
policies in Security Wheel
policies, failures
policies, J2EE domains for
policies, JAAS authorization
policies, Java 2
policies, management
policies, management, DMTF
policies, management, EPAL
policies, management, IETF Policy Management Working Group
policies, management, in Web services 2nd 3rd 4th
policies, management, Parlay Group
policies, management, services for
policies, reality checks for
policies, XACML 2nd 3rd
Policy Administration Points (PAPs) 2nd
policy class
Policy Decision Point Authority
Policy decision points (PDPs)
Policy decision points (PDPs), SAML
Policy decision points (PDPs), sample programs
Policy decision points (PDPs), XACML 2nd
Policy decision points (PDPs), XACML 2.0 with SAML 2.0
Policy Delegate pattern 2nd
Policy Delegate pattern, consequences
Policy Delegate pattern, forces
Policy Delegate pattern, participants and responsibilities
Policy Delegate pattern, problem
Policy Delegate pattern, reality check
Policy Delegate pattern, related patterns
Policy Delegate pattern, sample code
Policy Delegate pattern, security factors and risks
Policy Delegate pattern, solution
Policy Delegate pattern, strategies
Policy Delegate pattern, structure
Policy Enforcement Points (PEPs)
Policy Enforcement Points (PEPs), SAML 2nd
Policy Enforcement Points (PEPs), XACML
Policy Enforcement Points (PEPs), XACML 2.0 with SAML 2.0
Policy repository
Policy repository, SAML
Policy repository, XACML
Policy sets
Policy stores
Policytool tool 2nd 3rd
portals
Portals in use cases 2nd
Portals in user account provisioning
Portals, SSO through
Possibility risk factor
Possibility risk factor in case study
Possibility risk factor in risk analysis
Post-issuance applet downloads
Post-process audit handling
Post-synchronization event strategy
PRE (Password-Based Encryption)
Pre-process audit handling
Prerequisites in case study
Presentation tier
Presentation tier, J2EE 2nd
Presentation tier, reality checks for
Pretexting Provisions
Pretty Good Privacy (PGP)
Pretty Good Privacy (PGP) in PKI
Pretty Good Privacy (PGP) in trust models
Preventive transformations
Primitives in Java
Principal class
Principal-based policy files
Principals
Principals, Authorization Enforcer pattern
Principals, delegation of
Principals, J2EE
Principals, JAAS authorization
Principals, JAAS Login Module Strategy
Principals, Liberty specifications
Principals, propagation of
Principals, resource
Printing certificate information
Priorities
Privacy
Privacy, Secure Pipe pattern
Privacy, security provisioning patterns
Privacy, Security Services
Privacy, XACML
Privacy-rule administrators
Private keys
Private/public key pairs
PrivateCredentialsPermission class
PrivateKey interface
PrivilegedAction
Proactive assessment
Proactive security 2nd
Probability risk factors
Problem in security pattern templates
Problem in security pattern templates, Assertion Builder
Problem in security pattern templates, Audit Interceptor
Problem in security pattern templates, Authentication Enforcer
Problem in security pattern templates, Authorization Enforcer
Problem in security pattern templates, Container Managed Security
Problem in security pattern templates, Credential Tokenizer
Problem in security pattern templates, Dynamic Service Management
Problem in security pattern templates, Intercepting Validator
Problem in security pattern templates, Intercepting Web Agent
Problem in security pattern templates, Message Inspector
Problem in security pattern templates, Message Interceptor Gateway
Problem in security pattern templates, Obfuscated Transfer Object
Problem in security pattern templates, Password Synchronizer
Problem in security pattern templates, Policy Delegate
Problem in security pattern templates, Secure Base Action
Problem in security pattern templates, Secure Logger
Problem in security pattern templates, Secure Message Router
Problem in security pattern templates, Secure Pipe
Problem in security pattern templates, Secure Service Facade
Problem in security pattern templates, Secure Service Proxy
Problem in security pattern templates, Secure Session Object
Problem in security pattern templates, Single Sign-on Delegator
process method
processPasswordSyncRequests method
Profiles
Profiles in case study
Profiles, J2ME
Profiles, SAML 2nd 3rd
Profiles, XACML
Programmatic security
Programmatic security, authentication
Programmatic security, authorization
Programmatic security, authorization, Authorization Enforcer pattern
Programmatic security, authorization, J2EE 2nd 3rd 4th
Programmatic security, Container Managed Security pattern
Programmatic security, EJB method using
Programmatic security, Password Synchronizer pattern
Programmatic security, validation logic
Proprietary solutions
Protected resources
Protection domains
Protection domains, J2EE
Protection domains, Java 2
ProtectionDomain class
Protocol Binding strategy
Protocol Binding strategy, Assertion Builder pattern
Protocol Binding strategy, Credential Tokenizer patterns
Protocol Binding strategy, Password Synchronizer pattern
Protocols
Protocols stack
Protocols, Business tier patterns
Реклама