Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] RA (risk analysis) Radio Frequency Identification (RFID) RAM for Secure Session Object pattern in smart cards Random number generation Rationale in security design RBAC profiles RC6 algorithm Reactive security Readers RFID smart card 2nd Reality checks 2nd Business tier Client Device tier for administration for policies for quality of services in security pattern templates Assertion Builder Audit Interceptor Authentication Enforcer Authorization Enforcer Container Managed Security Credential Tokenizer Dynamic Service Management Intercepting Validator Intercepting Web Agent Message Inspector Message Interceptor Gateway Obfuscated Transfer Object Password Synchronizer Policy Delegate Secure Base Action Secure Logger Secure Message Router Secure Pipe Secure Service Facade Secure Service Proxy Secure Session Object Single Sign-on Delegator Integration tier Presentation tier Web tier Realms for smart cards J2EE 2nd JAAS Reconciliation in user account provisioning Recovery 2nd in case study in use cases in XKMS key service Redirection, web Redundancy in Policy Delegate pattern Refactoring security design Reference templates for biometrics registerObject method Registration identity UDDI Registries Dynamic Service Management pattern UDDI Web services XACML RegistryMonitor class Regulatory policies Reissue service, key REL (Rights Expression Language) Related patterns in security pattern templates 2nd Assertion Builder Audit Interceptor Authentication Enforcer Authorization Enforcer Container Managed Security Credential Tokenizer Dynamic Service Management Intercepting Validator Intercepting Web Agent Message Inspector Message Interceptor Gateway Obfuscated Transfer Object Password Synchronizer Policy Delegate Secure Base Action Secure Logger Secure Message Router Secure Pipe Secure Service Facade Secure Service Proxy Secure Session Object Single Sign-on Delegator Relationships in Liberty Alliance Reliability Assertion Builder pattern Secure Message Router pattern reloadMBeans method Remote interface and services Secure Service Facade pattern Single Sign-on Delegator pattern removeAssertionReply method removeAssertionStatement method removeCompRef method removeSessionInfo method removeSSOTokenMap method Replay attacks Intercepting Web Agent pattern SAML Web services XKMS Reporting practices Gramm-Leach-Bliley Act Sarbanes-Oxley Act Reporting services in identity management Repository for biometric information SAML XACML Request messages Message Inspector pattern 2nd Secure Message Router pattern Request-reply model SAML attribute assertion authentication assertions SPML RequestContext class Authentication Enforcer pattern Authorization Enforcer pattern JAAS Login Module Strategy Requesters for Web services Requesting Authority RequestMessage class Requests, XACML Required flag Requirements in use cases Secure UP 2nd security basics Requisite flag Resource principals Resource profiles Resources tier respond method Response APDUs Response Message Message Inspector pattern Message Interceptor Gateway pattern Retinal analysis Reusability in security patterns Authorization Enforcer Message Inspector Message Interceptor Gateway Secure Base Action Secure Message Router Java components password Reverse engineering Java code Revocation issues and services LDAP Single Sign-on Delegator pattern X-KRSS Revoked smart cards RFID (Radio Frequency Identification) Rich-client authentication Rights Expression Language (REL) Rijndael algorithm RIPEMD-160 encryption algorithms Risk analysis (RA) Risk Analyzer Risks in case study 2nd in patterns-driven security design in security patterns Assertion Builder Audit Interceptor Authentication Enforcer Authorization Enforcer Container Managed Security Credential Tokenizer Dynamic Service Management Intercepting Validator Intercepting Web Agent Message Inspector Message Interceptor Gateway Obfuscated Transfer Object Password Synchronizer Policy Delegate Secure Base Action Secure Logger Secure Message Router Secure Pipe Secure Service Facade Secure Service Proxy Secure Session Object Single Sign-on Delegator in security provisioning patterns in trust model in use cases in Web services RMI socket factories client server RMI/IIOP-based clients ROI study Roles Business tier 2nd Container Managed Security pattern identity management J2EE 2nd ROM in smart cards Root certificates Root nodes in attack trees Rotate ciphers Routers. [See Secure Message Router pattern] RPC style web services RSA BSAFE Secure-WS toolkit RSA cipher RSA-SHA1 algorithm Rule Engine Rule-based service integration and invocation Rules EPAL in policy design XACML run method Run-as identity |