Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Авторы: Steel Ch., Nagappan R., Lai R.

Аннотация:

For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1088

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Participants and responsibilities in security patterns, Credential Tokenizer      
Participants and responsibilities in security patterns, Dynamic Service Management      2nd
Participants and responsibilities in security patterns, Intercepting Validator      2nd
Participants and responsibilities in security patterns, Intercepting Web Agent      
Participants and responsibilities in security patterns, Message Inspector      
Participants and responsibilities in security patterns, Message Interceptor Gateway      
Participants and responsibilities in security patterns, Obfuscated Transfer Object      
Participants and responsibilities in security patterns, Password Synchronizer      
Participants and responsibilities in security patterns, Policy Delegate      
Participants and responsibilities in security patterns, Secure Base Action      2nd
Participants and responsibilities in security patterns, Secure Logger
Participants and responsibilities in security patterns, Secure Message Router      
Participants and responsibilities in security patterns, Secure Service Facade      2nd
Participants and responsibilities in security patterns, Secure Service Proxy      
Participants and responsibilities in security patterns, Secure Session Object
Participants and responsibilities in security patterns, Single Sign-on Delegator      
Partitioning in network topology      
Passive RFID tags
Password Manager
Password Synchronizer Manager
Password Synchronizer pattern      2nd
Password Synchronizer pattern, consequences
Password Synchronizer pattern, forces
Password Synchronizer pattern, participants and responsibilities      
Password Synchronizer pattern, problem      
Password Synchronizer pattern, reality check
Password Synchronizer pattern, related patterns
Password Synchronizer pattern, sample code
Password Synchronizer pattern, security factors and risks      
Password Synchronizer pattern, solution
Password Synchronizer pattern, strategies
Password Synchronizer pattern, structure
Password-Based Encryption (PRE)
Passwords
Passwords in authentication      
Passwords, Credential Tokenizer patterns      
Passwords, exploits      
Passwords, Identity management      2nd
Passwords, JAAS authorization      
Passwords, keystore
Passwords, SAML
Passwords, smart cards      
passwords, synchronization      2nd [See also Password Synchronizer pattern]
Passwords, vendor products for      
Passwords, Web tier patterns      
PasswordSyncLedger class      
PasswordSyncLedger class, notification messages from
PasswordSyncLedger class, sample code      2nd
PasswordSyncListener class
PasswordSyncListener class, sample code      2nd
PasswordSyncListener class, screen display messages from
PasswordSyncManager class      2nd 3rd
PasswordSyncRequest class      2nd 3rd
patches      
Patches in Secure UP
Patches, problems from
Patterns, security      [See Security patterns]
PBEWithMD5AndDES algorithm      
PC/SC framework
PCKS providers
PDPs (policy decision points)
PDPs, SAML
PDPs, sample programs
PDPs, XACML      2nd
PDPs, XACML 2.0 with SAML 2.0
penetration tests
PEPs (Policy Enforcement Points)
PEPs, SAML      2nd
PEPs, XACML
PEPs, XACML 2.0 with SAML 2.0
Performance      
Performance in security patterns
Performance in security patterns, Audit Interceptor      2nd
Performance in security patterns, Business tier
Performance in security patterns, Intercepting Validator
Performance in security patterns, Message Interceptor Gateway
Performance in security patterns, Obfuscated Transfer Object
Performance in security patterns, Policy Delegate
Performance in security patterns, Secure Logger      2nd
Performance in security patterns, Secure Pipe      2nd
Performance, helper classes for
Performance, J2EE network topology      
Permission class      2nd
PermissionCollection class      2nd
PERMISSIONS      
Permissions, J2EE
Permissions, Java 2      
Permissions, JNLP
Permissions, MIDlets
Permissions, tag library for      
Permissions, Web tier patterns
PermissionsCollection class
Persistent mode      
Personal Data Ordinance
Personal Health Information (PHI)
Personal identification      2nd
Personal identification, authentication
Personal identification, best practices      
Personal identification, biometric      [See Biometric identification and authentication]
Personal identification, enabling technologies      [See Enabling technologies for personal identification]
Personal identification, physical and logical access control
Personal identification, pitfalls
Personal identification, references
Personal identification, RFID-based
Personal identification, smart cards      [See Smart cards]
PGP (Pretty Good Privacy)      
PGP in PKI
PGP in trust models
PHI (Personal Health Information)      
phishing
Physical access control      2nd
PINs for smart cards      2nd
Pipes      
Pipes and Filters pattern      
Pipes, Secure Pipe pattern      [See Secure Pipe pattern]
Pipes, Web tier patterns
Pitfalls
Pitfalls in case study
Pitfalls in personal identification
Pitfalls in security patterns      
Pitfalls in security patterns, Business tier
Pitfalls in security patterns, Identity management      
Pitfalls in security patterns, security provisioning      
Pitfalls in security patterns, Web services
PKCS#11 interface standard      2nd
PKCS#15 interface standard
PKCS1 algorithm
PKI (Public Key Infrastructure)
PKI in Security Wheel
PKI, limitations
PKI, Web tier patterns
PKI, XML
PKITS (Public Key Interoperability Test Suite)      
PKIX
PKIXParameters class
Platforms in case study
Plug-ins
Plug-ins for biometrics      
Plug-ins for smart cards      
Plug-ins in Java System Access Manager
Pluggable Authentication Module (PAM)      2nd
Pluggable Authentication Module (PAM) for biometrics      
Pluggable Authentication Module (PAM) for smart cards
Point-to-Point Channel pattern      
Point-to-point interfaces
Pointers in Java      
POJO business objects      2nd
policies
policies in case study      
policies in security patterns      
policies in security patterns, Business tier      2nd
policies in security patterns, Identity management      
policies in security patterns, Intercepting Web Agent      
policies in security patterns, Secure Service Facade      
policies in security patterns, Web tier      
policies in Security Wheel      
policies, failures
policies, J2EE domains for      
policies, JAAS authorization
policies, Java 2
policies, management
policies, management, DMTF      
policies, management, EPAL      
policies, management, IETF Policy Management Working Group
policies, management, in Web services      2nd 3rd 4th
policies, management, Parlay Group      
policies, management, services for      
policies, reality checks for      
policies, XACML      2nd 3rd
Policy Administration Points (PAPs)      2nd
policy class
Policy Decision Point Authority
Policy decision points (PDPs)      
Policy decision points (PDPs), SAML      
Policy decision points (PDPs), sample programs      
Policy decision points (PDPs), XACML      2nd
Policy decision points (PDPs), XACML 2.0 with SAML 2.0
Policy Delegate pattern      2nd
Policy Delegate pattern, consequences      
Policy Delegate pattern, forces      
Policy Delegate pattern, participants and responsibilities
Policy Delegate pattern, problem
Policy Delegate pattern, reality check
Policy Delegate pattern, related patterns
Policy Delegate pattern, sample code
Policy Delegate pattern, security factors and risks      
Policy Delegate pattern, solution
Policy Delegate pattern, strategies
Policy Delegate pattern, structure
Policy Enforcement Points (PEPs)
Policy Enforcement Points (PEPs), SAML      2nd
Policy Enforcement Points (PEPs), XACML
Policy Enforcement Points (PEPs), XACML 2.0 with SAML 2.0
Policy repository
Policy repository, SAML
Policy repository, XACML      
Policy sets
Policy stores
Policytool tool      2nd 3rd
portals
Portals in use cases      2nd
Portals in user account provisioning
Portals, SSO through      
Possibility risk factor      
Possibility risk factor in case study      
Possibility risk factor in risk analysis
Post-issuance applet downloads
Post-process audit handling
Post-synchronization event strategy
PRE (Password-Based Encryption)      
Pre-process audit handling
Prerequisites in case study
Presentation tier
Presentation tier, J2EE      2nd
Presentation tier, reality checks for      
Pretexting Provisions
Pretty Good Privacy (PGP)
Pretty Good Privacy (PGP) in PKI
Pretty Good Privacy (PGP) in trust models      
Preventive transformations      
Primitives in Java
Principal class
Principal-based policy files      
Principals      
Principals, Authorization Enforcer pattern
Principals, delegation of
Principals, J2EE
Principals, JAAS authorization      
Principals, JAAS Login Module Strategy
Principals, Liberty specifications
Principals, propagation of      
Principals, resource
Printing certificate information      
Priorities
Privacy
Privacy, Secure Pipe pattern      
Privacy, security provisioning patterns      
Privacy, Security Services
Privacy, XACML
Privacy-rule administrators
Private keys
Private/public key pairs
PrivateCredentialsPermission class
PrivateKey interface
PrivilegedAction
Proactive assessment      
Proactive security      2nd
Probability risk factors      
Problem in security pattern templates      
Problem in security pattern templates, Assertion Builder      
Problem in security pattern templates, Audit Interceptor
Problem in security pattern templates, Authentication Enforcer      
Problem in security pattern templates, Authorization Enforcer      
Problem in security pattern templates, Container Managed Security
Problem in security pattern templates, Credential Tokenizer
Problem in security pattern templates, Dynamic Service Management
Problem in security pattern templates, Intercepting Validator
Problem in security pattern templates, Intercepting Web Agent      
Problem in security pattern templates, Message Inspector
Problem in security pattern templates, Message Interceptor Gateway
Problem in security pattern templates, Obfuscated Transfer Object
Problem in security pattern templates, Password Synchronizer
Problem in security pattern templates, Policy Delegate      
Problem in security pattern templates, Secure Base Action
Problem in security pattern templates, Secure Logger
Problem in security pattern templates, Secure Message Router
Problem in security pattern templates, Secure Pipe      
Problem in security pattern templates, Secure Service Facade      
Problem in security pattern templates, Secure Service Proxy      
Problem in security pattern templates, Secure Session Object
Problem in security pattern templates, Single Sign-on Delegator
process method
processPasswordSyncRequests method
Profiles
Profiles in case study
Profiles, J2ME
Profiles, SAML      2nd 3rd
Profiles, XACML
Programmatic security
Programmatic security, authentication      
Programmatic security, authorization
Programmatic security, authorization, Authorization Enforcer pattern
Programmatic security, authorization, J2EE      2nd 3rd 4th
Programmatic security, Container Managed Security pattern
Programmatic security, EJB method using
Programmatic security, Password Synchronizer pattern
Programmatic security, validation logic
Proprietary solutions
Protected resources
Protection domains
Protection domains, J2EE      
Protection domains, Java 2      
ProtectionDomain class      
Protocol Binding strategy
Protocol Binding strategy, Assertion Builder pattern
Protocol Binding strategy, Credential Tokenizer patterns
Protocol Binding strategy, Password Synchronizer pattern
Protocols
Protocols stack
Protocols, Business tier patterns
1 2 3 4 5 6 7 8 9 10 11 12 13 14
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2026
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте