B



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

B2B (Business-to-Business) applications
     identity management in
     Liberty Alliance transaction support in
Back-out password strategy
Basic authentication
     in web.xml
     J2EE 2nd
Basic Information
Basic Profile
Basics of security
    cryptography. [See Encryption and cryptography]
     identity management
    LDAP. [See LDAP (Lightweight Directory Access Protocol)]
     references
     requirements and goals
     summary
     threat modeling
beginHandshake method
Bertillon, Alphonse
Best practices
    Business tier patterns
         architecture
         infrastructure
         policy
     Identity management patterns
    personal identification
         biometrics
         smart cards
    security provisioning patterns
         application design
         quality of service
         risk mitigation
         server sizing
    Web services patterns
         communication and message security
         infrastructure
         testing and deployment
     Web tier patterns
         applications
         communication
         infrastructure
Binary security tokens
BinaryToken class
BIND requests
BioAPI standard 2nd
Biometric identification and authentication 2nd 3rd
     accuracy
     architecture and implementation
     best practices
     in multi-factor authentication
     operational models
     SSO strategy
     verification process
Biometric service providers (BSPs)
Black box testing
     in case study
     Secure UP 2nd 3rd
Blanket MIDlets
Block ciphers
Block encryption algorithms
Bodies in SOAP messages
Broken access control risk
Broken authentication
     Assertion Builder pattern
     Password Synchronizer pattern
Browser plug-ins
     for biometrics
     for smart cards
Brute force attacks
BSPs (biometric service providers)
Buffer overflow
Build portion in patterns-driven security design
Build vs. buy decisions
     Assertion Builder pattern
     Business tier pattern
     Intercepting Web Agent pattern
     Password Synchronizer pattern
Built-in Java security model
Business and business challenges
     in case study
     processing logic
     service provisioning
     tasks auditing
Business Delegate pattern
     and Delegate pattern
     and Single Sign-on Delegator pattern
     and Synchronizer pattern
Business tier
     in case study 2nd 3rd
    in J2EE. [See EJB tier in J2EE]
     reality checks for
     security patterns 2nd
         Audit Interceptor
         best practices
         Container Managed Security
         Dynamic Service Management
         factor analysis
         Obfuscated Transfer Object
         overview 2nd
         pitfalls
         Policy Delegate
         references
         Secure Service Facade
         Secure Session Object
Business-to-Business (B2B) applications
     identity management in
     Liberty Alliance transaction support in
Bytecode verifiers




Core Security Patterns. Best Practices and Strategies for J2EE, Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net