Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Авторы: Steel Ch., Nagappan R., Lai R.

Аннотация:

For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1088

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Participants and responsibilities in security patterns, Credential Tokenizer      
Participants and responsibilities in security patterns, Dynamic Service Management      2nd
Participants and responsibilities in security patterns, Intercepting Validator      2nd
Participants and responsibilities in security patterns, Intercepting Web Agent      
Participants and responsibilities in security patterns, Message Inspector      
Participants and responsibilities in security patterns, Message Interceptor Gateway      
Participants and responsibilities in security patterns, Obfuscated Transfer Object      
Participants and responsibilities in security patterns, Password Synchronizer      
Participants and responsibilities in security patterns, Policy Delegate      
Participants and responsibilities in security patterns, Secure Base Action      2nd
Participants and responsibilities in security patterns, Secure Logger      
Participants and responsibilities in security patterns, Secure Message Router      
Participants and responsibilities in security patterns, Secure Service Facade      2nd
Participants and responsibilities in security patterns, Secure Service Proxy      
Participants and responsibilities in security patterns, Secure Session Object      
Participants and responsibilities in security patterns, Single Sign-on Delegator      
Partitioning in network topology      
Passive RFID tags      
Password Manager      
Password Synchronizer Manager      
Password Synchronizer pattern      2nd
Password Synchronizer pattern, consequences      
Password Synchronizer pattern, forces      
Password Synchronizer pattern, participants and responsibilities      
Password Synchronizer pattern, problem      
Password Synchronizer pattern, reality check      
Password Synchronizer pattern, related patterns      
Password Synchronizer pattern, sample code      
Password Synchronizer pattern, security factors and risks      
Password Synchronizer pattern, solution      
Password Synchronizer pattern, strategies      
Password Synchronizer pattern, structure      
Password-Based Encryption (PRE)      
Passwords      
Passwords in authentication      
Passwords, Credential Tokenizer patterns      
Passwords, exploits      
Passwords, Identity management      2nd
Passwords, JAAS authorization      
Passwords, keystore      
Passwords, SAML      
Passwords, smart cards      
passwords, synchronization      2nd [See also Password Synchronizer pattern]
Passwords, vendor products for      
Passwords, Web tier patterns      
PasswordSyncLedger class      
PasswordSyncLedger class, notification messages from      
PasswordSyncLedger class, sample code      2nd
PasswordSyncListener class      
PasswordSyncListener class, sample code      2nd
PasswordSyncListener class, screen display messages from      
PasswordSyncManager class      2nd 3rd
PasswordSyncRequest class      2nd 3rd
patches      
Patches in Secure UP      
Patches, problems from      
Patterns, security      [See Security patterns]
PBEWithMD5AndDES algorithm      
PC/SC framework      
PCKS providers      
PDPs (policy decision points)      
PDPs, SAML      
PDPs, sample programs      
PDPs, XACML      2nd
PDPs, XACML 2.0 with SAML 2.0      
penetration tests      
PEPs (Policy Enforcement Points)      
PEPs, SAML      2nd
PEPs, XACML      
PEPs, XACML 2.0 with SAML 2.0      
Performance      
Performance in security patterns      
Performance in security patterns, Audit Interceptor      2nd
Performance in security patterns, Business tier      
Performance in security patterns, Intercepting Validator      
Performance in security patterns, Message Interceptor Gateway      
Performance in security patterns, Obfuscated Transfer Object      
Performance in security patterns, Policy Delegate      
Performance in security patterns, Secure Logger      2nd
Performance in security patterns, Secure Pipe      2nd
Performance, helper classes for      
Performance, J2EE network topology      
Permission class      2nd
PermissionCollection class      2nd
PERMISSIONS      
Permissions, J2EE      
Permissions, Java 2      
Permissions, JNLP      
Permissions, MIDlets      
Permissions, tag library for      
Permissions, Web tier patterns      
PermissionsCollection class      
Persistent mode      
Personal Data Ordinance      
Personal Health Information (PHI)      
Personal identification      2nd
Personal identification, authentication      
Personal identification, best practices      
Personal identification, biometric      [See Biometric identification and authentication]
Personal identification, enabling technologies      [See Enabling technologies for personal identification]
Personal identification, physical and logical access control      
Personal identification, pitfalls      
Personal identification, references      
Personal identification, RFID-based      
Personal identification, smart cards      [See Smart cards]
PGP (Pretty Good Privacy)      
PGP in PKI      
PGP in trust models      
PHI (Personal Health Information)      
phishing      
Physical access control      2nd
PINs for smart cards      2nd
Pipes      
Pipes and Filters pattern      
Pipes, Secure Pipe pattern      [See Secure Pipe pattern]
Pipes, Web tier patterns      
Pitfalls      
Pitfalls in case study      
Pitfalls in personal identification      
Pitfalls in security patterns      
Pitfalls in security patterns, Business tier      
Pitfalls in security patterns, Identity management      
Pitfalls in security patterns, security provisioning      
Pitfalls in security patterns, Web services      
PKCS#11 interface standard      2nd
PKCS#15 interface standard
PKCS1 algorithm      
PKI (Public Key Infrastructure)      
PKI in Security Wheel      
PKI, limitations      
PKI, Web tier patterns      
PKI, XML      
PKITS (Public Key Interoperability Test Suite)      
PKIX      
PKIXParameters class      
Platforms in case study      
Plug-ins      
Plug-ins for biometrics      
Plug-ins for smart cards      
Plug-ins in Java System Access Manager      
Pluggable Authentication Module (PAM)      2nd
Pluggable Authentication Module (PAM) for biometrics      
Pluggable Authentication Module (PAM) for smart cards      
Point-to-Point Channel pattern      
Point-to-point interfaces      
Pointers in Java      
POJO business objects      2nd
policies      
policies in case study      
policies in security patterns      
policies in security patterns, Business tier      2nd
policies in security patterns, Identity management      
policies in security patterns, Intercepting Web Agent      
policies in security patterns, Secure Service Facade      
policies in security patterns, Web tier      
policies in Security Wheel      
policies, failures      
policies, J2EE domains for      
policies, JAAS authorization      
policies, Java 2      
policies, management      
policies, management, DMTF      
policies, management, EPAL      
policies, management, IETF Policy Management Working Group      
policies, management, in Web services      2nd 3rd 4th
policies, management, Parlay Group      
policies, management, services for      
policies, reality checks for      
policies, XACML      2nd 3rd
Policy Administration Points (PAPs)      2nd
policy class      
Policy Decision Point Authority      
Policy decision points (PDPs)      
Policy decision points (PDPs), SAML      
Policy decision points (PDPs), sample programs      
Policy decision points (PDPs), XACML      2nd
Policy decision points (PDPs), XACML 2.0 with SAML 2.0      
Policy Delegate pattern      2nd
Policy Delegate pattern, consequences      
Policy Delegate pattern, forces      
Policy Delegate pattern, participants and responsibilities      
Policy Delegate pattern, problem      
Policy Delegate pattern, reality check      
Policy Delegate pattern, related patterns      
Policy Delegate pattern, sample code      
Policy Delegate pattern, security factors and risks      
Policy Delegate pattern, solution      
Policy Delegate pattern, strategies      
Policy Delegate pattern, structure      
Policy Enforcement Points (PEPs)      
Policy Enforcement Points (PEPs), SAML      2nd
Policy Enforcement Points (PEPs), XACML      
Policy Enforcement Points (PEPs), XACML 2.0 with SAML 2.0      
Policy repository      
Policy repository, SAML      
Policy repository, XACML      
Policy sets      
Policy stores      
Policytool tool      2nd 3rd
portals      
Portals in use cases      2nd
Portals in user account provisioning      
Portals, SSO through      
Possibility risk factor      
Possibility risk factor in case study      
Possibility risk factor in risk analysis      
Post-issuance applet downloads      
Post-process audit handling      
Post-synchronization event strategy      
PRE (Password-Based Encryption)      
Pre-process audit handling      
Prerequisites in case study      
Presentation tier      
Presentation tier, J2EE      2nd
Presentation tier, reality checks for      
Pretexting Provisions      
Pretty Good Privacy (PGP)      
Pretty Good Privacy (PGP) in PKI      
Pretty Good Privacy (PGP) in trust models      
Preventive transformations      
Primitives in Java      
Principal class      
Principal-based policy files      
Principals      
Principals, Authorization Enforcer pattern      
Principals, delegation of      
Principals, J2EE      
Principals, JAAS authorization      
Principals, JAAS Login Module Strategy      
Principals, Liberty specifications      
Principals, propagation of      
Principals, resource      
Printing certificate information      
Priorities      
Privacy      
Privacy, Secure Pipe pattern      
Privacy, security provisioning patterns      
Privacy, Security Services      
Privacy, XACML      
Privacy-rule administrators      
Private keys      
Private/public key pairs      
PrivateCredentialsPermission class      
PrivateKey interface      
PrivilegedAction      
Proactive assessment      
Proactive security      2nd
Probability risk factors      
Problem in security pattern templates      
Problem in security pattern templates, Assertion Builder      
Problem in security pattern templates, Audit Interceptor      
Problem in security pattern templates, Authentication Enforcer      
Problem in security pattern templates, Authorization Enforcer      
Problem in security pattern templates, Container Managed Security      
Problem in security pattern templates, Credential Tokenizer      
Problem in security pattern templates, Dynamic Service Management      
Problem in security pattern templates, Intercepting Validator      
Problem in security pattern templates, Intercepting Web Agent      
Problem in security pattern templates, Message Inspector      
Problem in security pattern templates, Message Interceptor Gateway      
Problem in security pattern templates, Obfuscated Transfer Object      
Problem in security pattern templates, Password Synchronizer      
Problem in security pattern templates, Policy Delegate      
Problem in security pattern templates, Secure Base Action      
Problem in security pattern templates, Secure Logger      
Problem in security pattern templates, Secure Message Router      
Problem in security pattern templates, Secure Pipe      
Problem in security pattern templates, Secure Service Facade      
Problem in security pattern templates, Secure Service Proxy      
Problem in security pattern templates, Secure Session Object      
Problem in security pattern templates, Single Sign-on Delegator      
process method      
processPasswordSyncRequests method      
Profiles      
Profiles in case study      
Profiles, J2ME      
Profiles, SAML      2nd 3rd
Profiles, XACML      
Programmatic security      
Programmatic security, authentication      
Programmatic security, authorization      
Programmatic security, authorization, Authorization Enforcer pattern      
Programmatic security, authorization, J2EE      2nd 3rd 4th
Programmatic security, Container Managed Security pattern      
Programmatic security, EJB method using      
Programmatic security, Password Synchronizer pattern      
Programmatic security, validation logic      
Proprietary solutions      
Protected resources      
Protection domains      
Protection domains, J2EE      
Protection domains, Java 2      
ProtectionDomain class      
Protocol Binding strategy      
Protocol Binding strategy, Assertion Builder pattern      
Protocol Binding strategy, Credential Tokenizer patterns      
Protocol Binding strategy, Password Synchronizer pattern      
Protocols      
Protocols stack      
Protocols, Business tier patterns      
1 2 3 4 5 6 7 8 9 10 11 12 13 14
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте