Index

  

A

AAT (Application Assembly Tool),
absolute links,
acceptor, GSS-API, ,
interaction, implementing,
tokens,
access controller, ,
guarded objects,
principal-based ,
signed objects,
ACK flag, TCP,
ACL (Access Control List), ,
ACLs (Access Control Lists),
activation, EJBs,
active attacks,
operating systems,
addresses, IP addresses,
Aggressive mode, key exchange Phase 1,
AH (Authentication Header), IPSec,
AlgorithmParameterGenerator class,
AlgorithmParameters class, ,
AlgorithmParameterSpec class,
algorithms
cryptographic algorithms,
differential cryptanalysis,
DSS,
ECDSA,
hash algorithms, collision resistance,
MD algorithms,
implementation,
RIPEMD-160,
SHA-1 algorithm,
MD, breakdown,
MDs and,
aliases,
APIs (Application Program Interfaces), ,
Java-based, UDDI and,
UDDI API,
sniffers and,
applets,
security,
Application Component Providers, authentication and,
application object access, CORBA,
application security,
WLS,
application-level gateway, firewalls,
application-managed resource manage signon, J2EE,
application-managed sign-on, databases,
AppServer Edition, Borland Enterprise Server,
ARP (Address Resolution Protocol),
AS (Authentication Server),
assurance requirements, CC and,
asymmetric ciphers,
asymmetric encryption, databases,
asymmetric keys, ,
attacks
active, operating systems,
denial of service attacks,
dictionary attacks,
hack attacks
active,
denial of service attacks,
passive,
sniffers,
types, ,
weapons against,
network attacks,
monitoring terms,
sniffers,
SSL and,
viruses,
auditing,
authentication,
Application Component Providers,
components ,
CORBA,
credentials,
definition,
form-based,
HMAC,
HTTP basic authentication,
HTTPS mutual authentication,
J2EE components,
JAAS,
Kerberos and,
Kerberos Server,
layers ,
lazy authentication,
MAC,
mutual,
mutual authentication,
one-way,
PAM,
principals,
principals and,
public key,
server challenges,
server responses,
SSL,
stacked ,
two-phase process,
validation and,
Web- tier configuration,
Authenticator,
Authenticator class,
authenticator, TGS Service tickets,
authorization,
components, ,
CORBA,
definition,
J2EE components,
JAAS,
layers,
permissions,
principals,
  


Java Security Solutions
Java Security Solutions
ISBN: 0764549286
EAN: 2147483647
Year: 2001
Pages: 222

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net