List of Tables

  

Chapter 2: Hackers and Their Tools

Listing 2-1: FTP entries
Listing 2-2: Sniffer output example

Chapter 3: Java Security Components

Listing 3-1: Understanding an XOR
Listing 3-2: Understanding a hash

Chapter 4: Key Management Algorithms

Listing 4-1: SecretKey cipher pseudocode
Listing 4-2: The key pair cipher pseudocode
Listing 4-3: Modular exponential
Listing 4-4: The TestRandomMod class: A sample code for performing the modular exponential
Listing 4-5: Output of Listing 4-4
Listing 4-6: Diffie-Hellman example
Listing 4-7: The DHSimpleApp class: A sample application generating keys
Listing 4-8: Listing 4-7 output
Listing 4-9: Generating the DH key: An excerpt from Listing 4-7
Listing 4-10: An example output of a man-in-the-middle attack
Listing 4-11: The DHAgreement class: Java code for the man-in-the-middle attack
Listing 4-12: Encrypting/ decrypting the RSA message
Listing 4-13: Verifying the RSA algorithm
Listing 4-14: Service providers installed
Listing 4-15: The GetProviderInfo class: Code for generating Listing 4-14
Listing 4-16: The RSASimpleApp class: An RSA sample application
Listing 4-17: Output for Listing 4-16
Listing 4-18: Triple-DES two-key implementation
Listing 4-19: Triple-DES three-key implementation

Chapter 5: Elliptic Curve Cryptography

Listing 5-1: Modulo examples
Listing 5-2: The ECCProvider class: The Provider class
Listing 5-3: Adding the ECCProvider class
Listing 5-4: The ECCSimpleApp class: The sample application
Listing 5-5: The ECCKeyFactory class: The factory class
Listing 5-6: The ECCKeyPairGenerator class

Chapter 6: Key Management Through the Internet Protocol

Listing 6-1: The IPSec operation modes

Chapter 7: Implementing Keys with Java

Listing 7-1: KeyPairGenerator creation
Listing 7-2: Key pair generation
Listing 7-3: An entry for Sun
Listing 7-4: Associating the DSA algorithm to a class
Listing 7-5: The RichSeed class: Setting the seed twice
Listing 7-6: Output from Listing 7-5
Listing 7-7: Selecting the entropy source for the SecureRandom seed
Listing 7-8: The RichDSAKey class: Writing and reading a DSAPublicKeySpec
Listing 7-9: Output for Listing 7-8
Listing 7-10: The SunJCE entry
Listing 7-11: The SunJCE put entry for DES
Listing 7-12: The RichDESKey class: A demonstration of the DES secret key
Listing 7-13: Demonstration of the DES secret key: An output of Listing 7-12

Chapter 8: Java Implementation of Key Management

Listing 8-1: Interaction with keytool
Listing 8-2: Output of keytool -list
Listing 8-3: RFC 1421-generated certificate
Listing 8-4: Output of keytool printcert
Listing 8-5: Signing the Java2.jar
Listing 8-6: Signature File example
Listing 8-7: DSA file example
Listing 8-8: Grant entry example
Listing 8-9: jdk1.4 policy file entries

Chapter 9: Ensuring Data Integrity

Listing 9-1: The MD5 implementation
Listing 9-2: An example SHA-1 algorithm
Listing 9-3: Output from Listing 9-2

Chapter 10: Ensuring Message Authentication

Listing 10-1: The RichMAC class a: MAC algorithm
Listing 10-2: The output of Listing 10-1

Chapter 11: Signature Integrity

Listing 11-1: The RichDSA class: The DSA Signature sample application

Chapter 12: Understanding Ciphers

Listing 12-1: The RichRSACipher class: An RSA cipher implementation

Chapter 13: Extending New Ciphers with the JDK

Listing 13-1: The TestRSACiphers class: RSA test for the cipher
Listing 13-2: The RichProvider class: The Provider implementation
Listing 13-3: The RC4 algorithm

Chapter 14: Applying Ciphers

Listing 14-1: The TestPBECiphers class: PBE cipher testing
Listing 14-2: The TestBFCipher class: A Blowfish example

Chapter 16: Java Authentication and Authorization Through Kerberos

Listing 16-1: The kinit command
Listing 16-2: The kpasswd command
Listing 16-3: Kerberos commands and tools
Listing 16-4: The /etc/srvtab file

Chapter 17: Securing Messages with the Java GSS-API

Listing 17-1: The RichGSSService class: An example in creating the security context
Listing 17-2: The context loop, wrap, and unwrap methods
Listing 17-3: Basic configuration file
Listing 17-4: Client/server configuration file
Listing 17-5: RichGSSInitiator's policy file
Listing 17-6: RichGSSService's policy file

Chapter 18: Java Access: The Security Manager

Listing 18-1: The FileInputStream
Listing 18-2: Grant entry
Listing 18-3: A doPrivileged action
Listing 18-4: Code fragment to get the context
Listing 18-5: The RichGuard class: An example of a guarded object
Listing 18-6: The RichSign class: A signed object example
Listing 18-7: The grant entry structure
Listing 18-8: signedBy example
Listing 18-9: CodeBase example
Listing 18-10: Principal example
Listing 18-11: The RichPolicy class: A policy example code
Listing 18-12: Policy example code output
Listing 18-13: FilePermission example

Chapter 19: Java Authentication and Authorization Service

Listing 19-1: Grant entry
Listing 19-2: Grant entry with principal
Listing 19-3: The doAs method
Listing 19-4: The LoginContext class
Listing 19-5: The login configuration file
Listing 19-6: Defining the ConfigFile for reading login configurations
Listing 19-7: Runtime definitions
Listing 19-8: The JAASApp class: A JAAS application
Listing 19-9: The JAAS login configuration
Listing 19-10: The RichCallbackHandler class: An example of runtime definitions
Listing 19-11: Callback handler interaction
Listing 19-12: The permissions
Listing 19-13: Populating the callback list
Listing 19-14: A configuration file example
Listing 19-15: The JAASAction class: A privileged action example
Listing 19-16: A permission entry

Chapter 20: Working with Database Security

Listing 20-1: Container-managed sign-on
Listing 20-2: Deployment descriptor for container-managed sign-on
Listing 20-3: Application-managed sign-on

Chapter 21: Network Security Architecture

Listing 21-1: The SocketServer class: A socket listener example
Listing 21-2: The SocketClient class: A socket client example
Listing 21-3: Ping output
Listing 21-4: Ping showing an IP record route
Listing 21-5: netstat rn run on a Windows 2000 machine
Listing 21-6: Adding to the routing table
Listing 21-7: The Client_Socket class: An example of a client for Listing 21-8
Listing 21-8: The Server_Socket class: An example of a server for Listing 21-7
Listing 21-9: SocketChannel connection completion

Chapter 23: Java Secure Socket Extension

Listing 23-1: Server socket creation
Listing 23-2: X509-based key manager
Listing 23-3: Getting the SSLSession
Listing 23-4: The SSLServer class: An example for creating SSL server sockets
Listing 23-5: The SSLClient class: An example usage of SSLSocketFactory

Chapter 24: Java Digital Certificates

Listing 24-1: The RichCertificate class: Importing X509Certificate version 1 in Java
Listing 24-2: Output for Listing 24-1
Listing 24-3: The generated certificate
Listing 24-4: The ASN.1 notation of a CRL
Listing 24-5: The RichCRL class: Importing the CRL and CRL entries and adding extensions
Listing 24-6: The output for Listing 24-5
Listing 24-7: The CRL entry

Chapter 25: PKI Management

Listing 25-1: The RichPath : A CertPath initialization example
Listing 25-2: Building parameters with the PKIXParameters class
Listing 25-3: Retrieving CRLs from the LDAP server
Listing 25-4: Final validation

Chapter 26: Java Enterprise Security and Web Services Security

Listing 26-1: Digital signature
Listing 26-2: A WSDL document skeleton
Listing 26-3: A SOAP request message example
Listing 26-4: A SOAP message response example

Chapter 27: Securing Client-Side Components

Listing 27-1: Configuring the admin directory structure using the web.xml file
Listing 27-2: Simple JSP example
Listing 27-3: The login.jsp file for the Project Info App
Listing 27-4: The web.xml file for the Project Info App
Listing 27-5: A isUserInRole method example
Listing 27-6: The ProjSelectionServlet class: The main page for the Project Info App
Listing 27-7: The projectDetail.jsp for the Project Info App
Listing 27-8: The admin/projectedit.jsp for the Project Info App

Chapter 28: Securing Server-Side Components

Listing 28-1: ProjectHome.java
Listing 28-2: Project.java
Listing 28-3: ProjectBean.java
Listing 28-4: Project-cmp-rdbms-jar.xml
Listing 28-5: RMIClient.java
Listing 28-6: CORBAClient.java
  


Java Security Solutions
Java Security Solutions
ISBN: 0764549286
EAN: 2147483647
Year: 2001
Pages: 222

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net