Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Авторы: Steel Ch., Nagappan R., Lai R.

Аннотация:

For Web architects, developers, and project managers, this manual on internet applications and services security demonstrates security design for J2EE enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. It provides 23 patterns and 101 practices relating to Java 2 platform security, Java extensible security and API framework, smart cards and biometrics, and includes security compliances and case studies. The authors are Java security architects.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 1088

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Participants and responsibilities in security patterns, Credential Tokenizer      
Participants and responsibilities in security patterns, Dynamic Service Management      2nd
Participants and responsibilities in security patterns, Intercepting Validator      2nd
Participants and responsibilities in security patterns, Intercepting Web Agent
Participants and responsibilities in security patterns, Message Inspector
Participants and responsibilities in security patterns, Message Interceptor Gateway      
Participants and responsibilities in security patterns, Obfuscated Transfer Object
Participants and responsibilities in security patterns, Password Synchronizer
Participants and responsibilities in security patterns, Policy Delegate      
Participants and responsibilities in security patterns, Secure Base Action      2nd
Participants and responsibilities in security patterns, Secure Logger
Participants and responsibilities in security patterns, Secure Message Router      
Participants and responsibilities in security patterns, Secure Service Facade      2nd
Participants and responsibilities in security patterns, Secure Service Proxy      
Participants and responsibilities in security patterns, Secure Session Object
Participants and responsibilities in security patterns, Single Sign-on Delegator      
Partitioning in network topology      
Passive RFID tags      
Password Manager
Password Synchronizer Manager
Password Synchronizer pattern      2nd
Password Synchronizer pattern, consequences
Password Synchronizer pattern, forces      
Password Synchronizer pattern, participants and responsibilities      
Password Synchronizer pattern, problem
Password Synchronizer pattern, reality check      
Password Synchronizer pattern, related patterns
Password Synchronizer pattern, sample code      
Password Synchronizer pattern, security factors and risks      
Password Synchronizer pattern, solution      
Password Synchronizer pattern, strategies      
Password Synchronizer pattern, structure      
Password-Based Encryption (PRE)
Passwords      
Passwords in authentication      
Passwords, Credential Tokenizer patterns      
Passwords, exploits      
Passwords, Identity management      2nd
Passwords, JAAS authorization      
Passwords, keystore      
Passwords, SAML      
Passwords, smart cards      
passwords, synchronization      2nd [See also Password Synchronizer pattern]
Passwords, vendor products for      
Passwords, Web tier patterns      
PasswordSyncLedger class      
PasswordSyncLedger class, notification messages from      
PasswordSyncLedger class, sample code      2nd
PasswordSyncListener class
PasswordSyncListener class, sample code      2nd
PasswordSyncListener class, screen display messages from
PasswordSyncManager class      2nd 3rd
PasswordSyncRequest class      2nd 3rd
patches      
Patches in Secure UP
Patches, problems from      
Patterns, security      [See Security patterns]
PBEWithMD5AndDES algorithm      
PC/SC framework      
PCKS providers
PDPs (policy decision points)      
PDPs, SAML
PDPs, sample programs      
PDPs, XACML      2nd
PDPs, XACML 2.0 with SAML 2.0
penetration tests
PEPs (Policy Enforcement Points)
PEPs, SAML      2nd
PEPs, XACML
PEPs, XACML 2.0 with SAML 2.0
Performance
Performance in security patterns
Performance in security patterns, Audit Interceptor      2nd
Performance in security patterns, Business tier      
Performance in security patterns, Intercepting Validator
Performance in security patterns, Message Interceptor Gateway
Performance in security patterns, Obfuscated Transfer Object      
Performance in security patterns, Policy Delegate
Performance in security patterns, Secure Logger      2nd
Performance in security patterns, Secure Pipe      2nd
Performance, helper classes for
Performance, J2EE network topology
Permission class      2nd
PermissionCollection class      2nd
PERMISSIONS
Permissions, J2EE      
Permissions, Java 2      
Permissions, JNLP
Permissions, MIDlets      
Permissions, tag library for
Permissions, Web tier patterns      
PermissionsCollection class      
Persistent mode      
Personal Data Ordinance      
Personal Health Information (PHI)      
Personal identification      2nd
Personal identification, authentication      
Personal identification, best practices      
Personal identification, biometric      [See Biometric identification and authentication]
Personal identification, enabling technologies      [See Enabling technologies for personal identification]
Personal identification, physical and logical access control
Personal identification, pitfalls      
Personal identification, references      
Personal identification, RFID-based      
Personal identification, smart cards      [See Smart cards]
PGP (Pretty Good Privacy)      
PGP in PKI      
PGP in trust models      
PHI (Personal Health Information)
phishing      
Physical access control      2nd
PINs for smart cards      2nd
Pipes
Pipes and Filters pattern      
Pipes, Secure Pipe pattern      [See Secure Pipe pattern]
Pipes, Web tier patterns
Pitfalls      
Pitfalls in case study      
Pitfalls in personal identification
Pitfalls in security patterns      
Pitfalls in security patterns, Business tier      
Pitfalls in security patterns, Identity management
Pitfalls in security patterns, security provisioning      
Pitfalls in security patterns, Web services      
PKCS#11 interface standard      2nd
PKCS#15 interface standard
PKCS1 algorithm      
PKI (Public Key Infrastructure)
PKI in Security Wheel
PKI, limitations      
PKI, Web tier patterns      
PKI, XML      
PKITS (Public Key Interoperability Test Suite)
PKIX
PKIXParameters class      
Platforms in case study      
Plug-ins      
Plug-ins for biometrics      
Plug-ins for smart cards
Plug-ins in Java System Access Manager
Pluggable Authentication Module (PAM)      2nd
Pluggable Authentication Module (PAM) for biometrics      
Pluggable Authentication Module (PAM) for smart cards
Point-to-Point Channel pattern      
Point-to-point interfaces      
Pointers in Java      
POJO business objects      2nd
policies      
policies in case study
policies in security patterns      
policies in security patterns, Business tier      2nd
policies in security patterns, Identity management      
policies in security patterns, Intercepting Web Agent      
policies in security patterns, Secure Service Facade      
policies in security patterns, Web tier      
policies in Security Wheel      
policies, failures      
policies, J2EE domains for
policies, JAAS authorization      
policies, Java 2      
policies, management      
policies, management, DMTF      
policies, management, EPAL      
policies, management, IETF Policy Management Working Group      
policies, management, in Web services      2nd 3rd 4th
policies, management, Parlay Group
policies, management, services for      
policies, reality checks for      
policies, XACML      2nd 3rd
Policy Administration Points (PAPs)      2nd
policy class      
Policy Decision Point Authority      
Policy decision points (PDPs)      
Policy decision points (PDPs), SAML
Policy decision points (PDPs), sample programs      
Policy decision points (PDPs), XACML      2nd
Policy decision points (PDPs), XACML 2.0 with SAML 2.0      
Policy Delegate pattern      2nd
Policy Delegate pattern, consequences      
Policy Delegate pattern, forces      
Policy Delegate pattern, participants and responsibilities      
Policy Delegate pattern, problem      
Policy Delegate pattern, reality check      
Policy Delegate pattern, related patterns
Policy Delegate pattern, sample code
Policy Delegate pattern, security factors and risks      
Policy Delegate pattern, solution      
Policy Delegate pattern, strategies
Policy Delegate pattern, structure      
Policy Enforcement Points (PEPs)      
Policy Enforcement Points (PEPs), SAML      2nd
Policy Enforcement Points (PEPs), XACML      
Policy Enforcement Points (PEPs), XACML 2.0 with SAML 2.0
Policy repository
Policy repository, SAML      
Policy repository, XACML
Policy sets
Policy stores
Policytool tool      2nd 3rd
portals
Portals in use cases      2nd
Portals in user account provisioning
Portals, SSO through
Possibility risk factor
Possibility risk factor in case study      
Possibility risk factor in risk analysis      
Post-issuance applet downloads
Post-process audit handling      
Post-synchronization event strategy      
PRE (Password-Based Encryption)
Pre-process audit handling      
Prerequisites in case study      
Presentation tier
Presentation tier, J2EE      2nd
Presentation tier, reality checks for      
Pretexting Provisions      
Pretty Good Privacy (PGP)      
Pretty Good Privacy (PGP) in PKI      
Pretty Good Privacy (PGP) in trust models      
Preventive transformations      
Primitives in Java      
Principal class      
Principal-based policy files      
Principals      
Principals, Authorization Enforcer pattern
Principals, delegation of      
Principals, J2EE      
Principals, JAAS authorization
Principals, JAAS Login Module Strategy      
Principals, Liberty specifications
Principals, propagation of      
Principals, resource      
Printing certificate information      
Priorities      
Privacy
Privacy, Secure Pipe pattern      
Privacy, security provisioning patterns
Privacy, Security Services
Privacy, XACML      
Privacy-rule administrators      
Private keys      
Private/public key pairs      
PrivateCredentialsPermission class
PrivateKey interface      
PrivilegedAction      
Proactive assessment      
Proactive security      2nd
Probability risk factors      
Problem in security pattern templates
Problem in security pattern templates, Assertion Builder
Problem in security pattern templates, Audit Interceptor      
Problem in security pattern templates, Authentication Enforcer
Problem in security pattern templates, Authorization Enforcer
Problem in security pattern templates, Container Managed Security
Problem in security pattern templates, Credential Tokenizer
Problem in security pattern templates, Dynamic Service Management
Problem in security pattern templates, Intercepting Validator      
Problem in security pattern templates, Intercepting Web Agent
Problem in security pattern templates, Message Inspector      
Problem in security pattern templates, Message Interceptor Gateway      
Problem in security pattern templates, Obfuscated Transfer Object
Problem in security pattern templates, Password Synchronizer
Problem in security pattern templates, Policy Delegate      
Problem in security pattern templates, Secure Base Action      
Problem in security pattern templates, Secure Logger
Problem in security pattern templates, Secure Message Router
Problem in security pattern templates, Secure Pipe      
Problem in security pattern templates, Secure Service Facade
Problem in security pattern templates, Secure Service Proxy      
Problem in security pattern templates, Secure Session Object      
Problem in security pattern templates, Single Sign-on Delegator      
process method      
processPasswordSyncRequests method      
Profiles
Profiles in case study
Profiles, J2ME      
Profiles, SAML      2nd 3rd
Profiles, XACML
Programmatic security
Programmatic security, authentication
Programmatic security, authorization
Programmatic security, authorization, Authorization Enforcer pattern      
Programmatic security, authorization, J2EE      2nd 3rd 4th
Programmatic security, Container Managed Security pattern
Programmatic security, EJB method using
Programmatic security, Password Synchronizer pattern
Programmatic security, validation logic
Proprietary solutions      
Protected resources      
Protection domains
Protection domains, J2EE
Protection domains, Java 2      
ProtectionDomain class      
Protocol Binding strategy      
Protocol Binding strategy, Assertion Builder pattern
Protocol Binding strategy, Credential Tokenizer patterns
Protocol Binding strategy, Password Synchronizer pattern      
Protocols
Protocols stack      
Protocols, Business tier patterns
1 2 3 4 5 6 7 8 9 10 11 12 13 14
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2026
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте