F



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Facial recognition
Factor analysis
     for security patterns
     in case study
Factory pattern
Failover
     J2EE network topology
     service
Failure to Enroll (FTE) probability
False Acceptance Rate (FAR) probability 2nd
False Match Rate (FMR) probability
False Non-Match Rate (FNMR) probability
False Reject Rate (FRR) probability 2nd
FAR (False Acceptance Rate) probability 2nd
Fault handling
Fault tolerance
     J2EE network topology
     Message Interceptor Gateway pattern
     Secure Message Router pattern
     Web services patterns
FBI survey
Federal regulations 2nd
Federal Trade Commission survey
Federated affiliates
Federated data exchange
Federated identity 2nd
Federated SSO 2nd
Federation management in Liberty Alliance
Federation services
Federation termination protocol
Federations, cross-domain
fileChanged method
Final classes in Java
Financial losses
     from confidentiality breaches
     reported
Financial Privacy Rule
Financial Services Modernization Act
findApplicationId method
Fine-grained security
Fingerprint matching
     approaches to
     logical architecture
Fingerprints, key
Finished messages
Firewalls
     DMZs for
     for Java Card applets
     Secure Service Proxy pattern
     Web services patterns
     Web tier patterns
     XML 2nd
Flag values in JAAS 2nd
Flexibility in security patterns
     Intercepting Web Agent
     Secure Base Action
     Secure Service Proxy
     Single Sign-on Delegator
FMR (False Match Rate) probability
FNMR (False Non-Match Rate) probability
Forces in security pattern templates
     Assertion Builder
     Audit Interceptor
     Authentication Enforcer
     Authorization Enforcer
     Container Managed Security
     Credential Tokenizer
     Dynamic Service Management
     Intercepting Validator
     Intercepting Web Agent
     Message Inspector
     Message Interceptor Gateway
     Obfuscated Transfer Object
     Password Synchronizer
     Policy Delegate
     Secure Base Action
     Secure Logger
     Secure Message Router
     Secure Pipe
     Secure Service Facade
     Secure Service Proxy
     Secure Session Object
     Single Sign-on Delegator
Form validation
     in XML using Apache Struts
     Web tier patterns
Form-based authentication
     in web.xml
     J2EE 2nd
Form-POST-based redirection
Foundstone Enterprise testing tool
Fowler, Martin
Frameworks, security
     adopting
     in Secure Service Facade pattern
Front Controller pattern 2nd 3rd
FRR (False Reject Rate) probability 2nd
FTE (Failure to Enroll) probability
Full View with Errors pattern




Core Security Patterns. Best Practices and Strategies for J2EE, Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net