Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Авторы: Steel Ch., Nagappan R., Lai R.

Аннотация:

For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1088

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Participants and responsibilities in security patterns, Credential Tokenizer
Participants and responsibilities in security patterns, Dynamic Service Management      2nd
Participants and responsibilities in security patterns, Intercepting Validator      2nd
Participants and responsibilities in security patterns, Intercepting Web Agent
Participants and responsibilities in security patterns, Message Inspector      
Participants and responsibilities in security patterns, Message Interceptor Gateway
Participants and responsibilities in security patterns, Obfuscated Transfer Object
Participants and responsibilities in security patterns, Password Synchronizer      
Participants and responsibilities in security patterns, Policy Delegate
Participants and responsibilities in security patterns, Secure Base Action      2nd
Participants and responsibilities in security patterns, Secure Logger
Participants and responsibilities in security patterns, Secure Message Router
Participants and responsibilities in security patterns, Secure Service Facade      2nd
Participants and responsibilities in security patterns, Secure Service Proxy
Participants and responsibilities in security patterns, Secure Session Object
Participants and responsibilities in security patterns, Single Sign-on Delegator
Partitioning in network topology      
Passive RFID tags      
Password Manager      
Password Synchronizer Manager
Password Synchronizer pattern      2nd
Password Synchronizer pattern, consequences
Password Synchronizer pattern, forces
Password Synchronizer pattern, participants and responsibilities      
Password Synchronizer pattern, problem      
Password Synchronizer pattern, reality check
Password Synchronizer pattern, related patterns      
Password Synchronizer pattern, sample code
Password Synchronizer pattern, security factors and risks
Password Synchronizer pattern, solution
Password Synchronizer pattern, strategies      
Password Synchronizer pattern, structure
Password-Based Encryption (PRE)
Passwords
Passwords in authentication      
Passwords, Credential Tokenizer patterns
Passwords, exploits      
Passwords, Identity management      2nd
Passwords, JAAS authorization      
Passwords, keystore
Passwords, SAML
Passwords, smart cards
passwords, synchronization      2nd [See also Password Synchronizer pattern]
Passwords, vendor products for      
Passwords, Web tier patterns      
PasswordSyncLedger class
PasswordSyncLedger class, notification messages from
PasswordSyncLedger class, sample code      2nd
PasswordSyncListener class
PasswordSyncListener class, sample code      2nd
PasswordSyncListener class, screen display messages from
PasswordSyncManager class      2nd 3rd
PasswordSyncRequest class      2nd 3rd
patches      
Patches in Secure UP      
Patches, problems from
Patterns, security      [See Security patterns]
PBEWithMD5AndDES algorithm      
PC/SC framework
PCKS providers      
PDPs (policy decision points)      
PDPs, SAML
PDPs, sample programs      
PDPs, XACML      2nd
PDPs, XACML 2.0 with SAML 2.0
penetration tests
PEPs (Policy Enforcement Points)
PEPs, SAML      2nd
PEPs, XACML      
PEPs, XACML 2.0 with SAML 2.0      
Performance
Performance in security patterns      
Performance in security patterns, Audit Interceptor      2nd
Performance in security patterns, Business tier      
Performance in security patterns, Intercepting Validator      
Performance in security patterns, Message Interceptor Gateway
Performance in security patterns, Obfuscated Transfer Object
Performance in security patterns, Policy Delegate
Performance in security patterns, Secure Logger      2nd
Performance in security patterns, Secure Pipe      2nd
Performance, helper classes for      
Performance, J2EE network topology
Permission class      2nd
PermissionCollection class      2nd
PERMISSIONS      
Permissions, J2EE      
Permissions, Java 2
Permissions, JNLP      
Permissions, MIDlets      
Permissions, tag library for      
Permissions, Web tier patterns
PermissionsCollection class      
Persistent mode      
Personal Data Ordinance      
Personal Health Information (PHI)      
Personal identification      2nd
Personal identification, authentication      
Personal identification, best practices      
Personal identification, biometric      [See Biometric identification and authentication]
Personal identification, enabling technologies      [See Enabling technologies for personal identification]
Personal identification, physical and logical access control      
Personal identification, pitfalls
Personal identification, references      
Personal identification, RFID-based
Personal identification, smart cards      [See Smart cards]
PGP (Pretty Good Privacy)
PGP in PKI
PGP in trust models
PHI (Personal Health Information)
phishing
Physical access control      2nd
PINs for smart cards      2nd
Pipes
Pipes and Filters pattern      
Pipes, Secure Pipe pattern      [See Secure Pipe pattern]
Pipes, Web tier patterns      
Pitfalls      
Pitfalls in case study      
Pitfalls in personal identification      
Pitfalls in security patterns      
Pitfalls in security patterns, Business tier      
Pitfalls in security patterns, Identity management      
Pitfalls in security patterns, security provisioning      
Pitfalls in security patterns, Web services
PKCS#11 interface standard      2nd
PKCS#15 interface standard      
PKCS1 algorithm      
PKI (Public Key Infrastructure)
PKI in Security Wheel
PKI, limitations
PKI, Web tier patterns
PKI, XML
PKITS (Public Key Interoperability Test Suite)      
PKIX      
PKIXParameters class
Platforms in case study
Plug-ins      
Plug-ins for biometrics
Plug-ins for smart cards
Plug-ins in Java System Access Manager      
Pluggable Authentication Module (PAM)      2nd
Pluggable Authentication Module (PAM) for biometrics      
Pluggable Authentication Module (PAM) for smart cards
Point-to-Point Channel pattern
Point-to-point interfaces      
Pointers in Java      
POJO business objects      2nd
policies      
policies in case study      
policies in security patterns      
policies in security patterns, Business tier      2nd
policies in security patterns, Identity management      
policies in security patterns, Intercepting Web Agent      
policies in security patterns, Secure Service Facade      
policies in security patterns, Web tier      
policies in Security Wheel      
policies, failures      
policies, J2EE domains for      
policies, JAAS authorization      
policies, Java 2
policies, management
policies, management, DMTF
policies, management, EPAL      
policies, management, IETF Policy Management Working Group      
policies, management, in Web services      2nd 3rd 4th
policies, management, Parlay Group      
policies, management, services for
policies, reality checks for      
policies, XACML      2nd 3rd
Policy Administration Points (PAPs)      2nd
policy class
Policy Decision Point Authority      
Policy decision points (PDPs)      
Policy decision points (PDPs), SAML
Policy decision points (PDPs), sample programs      
Policy decision points (PDPs), XACML      2nd
Policy decision points (PDPs), XACML 2.0 with SAML 2.0
Policy Delegate pattern      2nd
Policy Delegate pattern, consequences      
Policy Delegate pattern, forces
Policy Delegate pattern, participants and responsibilities
Policy Delegate pattern, problem
Policy Delegate pattern, reality check
Policy Delegate pattern, related patterns
Policy Delegate pattern, sample code      
Policy Delegate pattern, security factors and risks
Policy Delegate pattern, solution
Policy Delegate pattern, strategies
Policy Delegate pattern, structure
Policy Enforcement Points (PEPs)
Policy Enforcement Points (PEPs), SAML      2nd
Policy Enforcement Points (PEPs), XACML      
Policy Enforcement Points (PEPs), XACML 2.0 with SAML 2.0      
Policy repository
Policy repository, SAML      
Policy repository, XACML
Policy sets      
Policy stores      
Policytool tool      2nd 3rd
portals
Portals in use cases      2nd
Portals in user account provisioning
Portals, SSO through      
Possibility risk factor
Possibility risk factor in case study
Possibility risk factor in risk analysis
Post-issuance applet downloads      
Post-process audit handling
Post-synchronization event strategy
PRE (Password-Based Encryption)
Pre-process audit handling
Prerequisites in case study
Presentation tier
Presentation tier, J2EE      2nd
Presentation tier, reality checks for      
Pretexting Provisions
Pretty Good Privacy (PGP)
Pretty Good Privacy (PGP) in PKI
Pretty Good Privacy (PGP) in trust models      
Preventive transformations
Primitives in Java
Principal class
Principal-based policy files
Principals
Principals, Authorization Enforcer pattern
Principals, delegation of
Principals, J2EE
Principals, JAAS authorization      
Principals, JAAS Login Module Strategy
Principals, Liberty specifications
Principals, propagation of
Principals, resource
Printing certificate information
Priorities
Privacy
Privacy, Secure Pipe pattern
Privacy, security provisioning patterns
Privacy, Security Services
Privacy, XACML
Privacy-rule administrators
Private keys
Private/public key pairs
PrivateCredentialsPermission class
PrivateKey interface
PrivilegedAction
Proactive assessment
Proactive security      2nd
Probability risk factors
Problem in security pattern templates
Problem in security pattern templates, Assertion Builder
Problem in security pattern templates, Audit Interceptor
Problem in security pattern templates, Authentication Enforcer
Problem in security pattern templates, Authorization Enforcer      
Problem in security pattern templates, Container Managed Security
Problem in security pattern templates, Credential Tokenizer
Problem in security pattern templates, Dynamic Service Management
Problem in security pattern templates, Intercepting Validator
Problem in security pattern templates, Intercepting Web Agent
Problem in security pattern templates, Message Inspector
Problem in security pattern templates, Message Interceptor Gateway
Problem in security pattern templates, Obfuscated Transfer Object      
Problem in security pattern templates, Password Synchronizer
Problem in security pattern templates, Policy Delegate
Problem in security pattern templates, Secure Base Action
Problem in security pattern templates, Secure Logger
Problem in security pattern templates, Secure Message Router
Problem in security pattern templates, Secure Pipe
Problem in security pattern templates, Secure Service Facade
Problem in security pattern templates, Secure Service Proxy      
Problem in security pattern templates, Secure Session Object      
Problem in security pattern templates, Single Sign-on Delegator
process method
processPasswordSyncRequests method
Profiles
Profiles in case study
Profiles, J2ME      
Profiles, SAML      2nd 3rd
Profiles, XACML
Programmatic security
Programmatic security, authentication
Programmatic security, authorization
Programmatic security, authorization, Authorization Enforcer pattern
Programmatic security, authorization, J2EE      2nd 3rd 4th
Programmatic security, Container Managed Security pattern
Programmatic security, EJB method using      
Programmatic security, Password Synchronizer pattern
Programmatic security, validation logic
Proprietary solutions      
Protected resources      
Protection domains      
Protection domains, J2EE
Protection domains, Java 2      
ProtectionDomain class
Protocol Binding strategy      
Protocol Binding strategy, Assertion Builder pattern
Protocol Binding strategy, Credential Tokenizer patterns      
Protocol Binding strategy, Password Synchronizer pattern      
Protocols      
Protocols stack      
Protocols, Business tier patterns      
1 2 3 4 5 6 7 8 9 10 11 12 13 14
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2025
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте