P



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Padding in JCE block ciphers
paint method
PAM (Pluggable Authentication Module) 2nd
     for biometrics
     for smart cards
PAPs (Policy Administration Points) 2nd
ParamValidator class
Parlay Group 2nd
Partial content of XML documents, accessing
Participants and responsibilities in security patterns
     Assertion Builder
     Audit Interceptor
     Authentication Enforcer
     Authorization Enforcer
     Container Managed Security
     Credential Tokenizer
     Dynamic Service Management 2nd
     Intercepting Validator 2nd
     Intercepting Web Agent
     Message Inspector
     Message Interceptor Gateway
     Obfuscated Transfer Object
     Password Synchronizer
     Policy Delegate
     Secure Base Action 2nd
     Secure Logger
     Secure Message Router
     Secure Service Facade 2nd
     Secure Service Proxy
     Secure Session Object
     Single Sign-on Delegator
Partitioning in network topology
Passive RFID tags
Password Manager
Password Synchronizer Manager
Password Synchronizer pattern 2nd
     consequences
     forces
     participants and responsibilities
     problem
     reality check
     related patterns
     sample code
     security factors and risks
     solution
     strategies
     structure
Password-Based Encryption (PRE)
Passwords
     Credential Tokenizer patterns
     exploits
     Identity management 2nd
     in authentication
     JAAS authorization
     keystore
     SAML
     smart cards
     synchronization 2nd [See also Password Synchronizer pattern]
     vendor products for
     Web tier patterns
PasswordSyncLedger class
     notification messages from
     sample code 2nd
PasswordSyncListener class
     sample code 2nd
     screen display messages from
PasswordSyncManager class 2nd 3rd
PasswordSyncRequest class 2nd 3rd
Patches
     in Secure UP
     problems from
Patterns, security. [See Security patterns]
PBEWithMD5AndDES algorithm
PC/SC framework
PCKS providers
PDPs (policy decision points)
     SAML
     sample programs
     XACML 2nd
     XACML 2.0 with SAML 2.0
Penetration tests
PEPs (Policy Enforcement Points)
     SAML 2nd
     XACML
     XACML 2.0 with SAML 2.0
Performance
     helper classes for
    in security patterns
         Audit Interceptor 2nd
         Business tier
         Intercepting Validator
         Message Interceptor Gateway
         Obfuscated Transfer Object
         Policy Delegate
         Secure Logger 2nd
         Secure Pipe 2nd
     J2EE network topology
Permission class 2nd
PermissionCollection class 2nd
Permissions
     J2EE
     Java 2
     JNLP
     MIDlets
     tag library for
     Web tier patterns
PermissionsCollection class
Persistent mode
Personal Data Ordinance
Personal Health Information (PHI)
Personal identification 2nd
     authentication
     best practices
    biometric. [See Biometric identification and authentication]
    enabling technologies. [See Enabling technologies for personal identification]
     physical and logical access control
     pitfalls
     references
     RFID-based
    smart cards. [See Smart cards]
PGP (Pretty Good Privacy)
     in PKI
     in trust models
PHI (Personal Health Information)
Phishing
Physical access control 2nd
PINs for smart cards 2nd
Pipes
    Secure Pipe pattern. [See Secure Pipe pattern]
     Web tier patterns
Pipes and Filters pattern
Pitfalls
     in case study
     in personal identification
    in security patterns
         Business tier
         Identity management
         security provisioning
         Web services
PKCS#11 interface standard 2nd
PKCS#15 interface standard
PKCS1 algorithm
PKI (Public Key Infrastructure)
     in Security Wheel
     limitations
     Web tier patterns
     XML
PKITS (Public Key Interoperability Test Suite)
PKIX
PKIXParameters class
Platforms in case study
Plug-ins
     for biometrics
     for smart cards
     in Java System Access Manager
Pluggable Authentication Module (PAM) 2nd
     for biometrics
     for smart cards
Point-to-Point Channel pattern
Point-to-point interfaces
Pointers in Java
POJO business objects 2nd
policies
     failures
     in case study
     in security patterns
         Business tier 2nd
         Identity management
         Intercepting Web Agent
         Secure Service Facade
         Web tier
     in Security Wheel
     J2EE domains for
     JAAS authorization
     Java 2
     management
         DMTF
         EPAL
         IETF Policy Management Working Group
         in Web services 2nd 3rd 4th
         Parlay Group
         services for
     reality checks for
     XACML 2nd 3rd
Policy Administration Points (PAPs) 2nd
Policy class
Policy Decision Point Authority
Policy decision points (PDPs)
     SAML
     sample programs
     XACML 2nd
     XACML 2.0 with SAML 2.0
Policy Delegate pattern 2nd
     consequences
     forces
     participants and responsibilities
     problem
     reality check
     related patterns
     sample code
     security factors and risks
     solution
     strategies
     structure
Policy Enforcement Points (PEPs)
     SAML 2nd
     XACML
     XACML 2.0 with SAML 2.0
Policy repository
     SAML
     XACML
Policy sets
Policy stores
Policytool tool 2nd 3rd
Portals
     in use cases 2nd
     in user account provisioning
     SSO through
Possibility risk factor
     in case study
     in risk analysis
Post-issuance applet downloads
Post-process audit handling
Post-synchronization event strategy
PRE (Password-Based Encryption)
Pre-process audit handling
Prerequisites in case study
Presentation tier
     J2EE 2nd
     reality checks for
Pretexting Provisions
Pretty Good Privacy (PGP)
     in PKI
     in trust models
Preventive transformations
Primitives in Java
Principal class
Principal-based policy files
Principals
     Authorization Enforcer pattern
     delegation of
     J2EE
     JAAS authorization
     JAAS Login Module Strategy
     Liberty specifications
     propagation of
     resource
Printing certificate information
Priorities
Privacy
     Secure Pipe pattern
     security provisioning patterns
     Security Services
     XACML
Privacy-rule administrators
Private keys
Private/public key pairs
PrivateCredentialsPermission class
PrivateKey interface
PrivilegedAction
Proactive assessment
Proactive security 2nd
Probability risk factors
Problem in security pattern templates
     Assertion Builder
     Audit Interceptor
     Authentication Enforcer
     Authorization Enforcer
     Container Managed Security
     Credential Tokenizer
     Dynamic Service Management
     Intercepting Validator
     Intercepting Web Agent
     Message Inspector
     Message Interceptor Gateway
     Obfuscated Transfer Object
     Password Synchronizer
     Policy Delegate
     Secure Base Action
     Secure Logger
     Secure Message Router
     Secure Pipe
     Secure Service Facade
     Secure Service Proxy
     Secure Session Object
     Single Sign-on Delegator
process method
processPasswordSyncRequests method
Profiles
     in case study
     J2ME
     SAML 2nd 3rd
     XACML
Programmatic security
     authentication
    authorization
         Authorization Enforcer pattern
         J2EE 2nd 3rd 4th
     Container Managed Security pattern
     EJB method using
     Password Synchronizer pattern
     validation logic
Proprietary solutions
Protected resources
Protection domains
     J2EE
     Java 2
ProtectionDomain class
Protocol Binding strategy
     Assertion Builder pattern
     Credential Tokenizer patterns
     Password Synchronizer pattern
Protocols
     Business tier patterns
     Java System Access Manager
     SAML
     Security Services
Protocols stack
Provider classes
     JCA
     JCE
Providers
     authorization 2nd
     J2EE
     JMS
     JSSE
     Liberty specifications 2nd
     LoginModule
     PCKS
     Secure Message Router pattern
     session state maintenance
     Web services 2nd
Provisioning Service Points 2nd
Provisioning Service Targets
Provisioning services. [See User account provisioning]
Proxies
     in Liberty specifications
    Secure Service Proxy pattern. [See Secure Service Proxy pattern]
Proxy pattern 2nd
Proxy tunneling
PSTID-ID mapping tables
Public Accounting Board
Public credential set
Public Key Infrastructure (PKI)
     in Security Wheel
     limitations
     Web tier patterns
     XML
Public Key Interoperability Test Suite (PKITS)
Public keys
     in assessment checklists
     LDAP 2nd
PublicKey interface
publishPasswordSyncResult method




Core Security Patterns. Best Practices and Strategies for J2EE, Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net