Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] UDDI (Universal Description, Discovery, and Integration) and Secure Logger pattern attacks on for Web services 2nd UIDGenerator class Unclassified data Unified credential tokens 2nd Unified Process (UP) references for secure. [See Secure UP] Unit testing Universal Description, Discovery, and Integration (UDDI) and Secure Logger pattern attacks on for Web services 2nd Unlimited strength cryptography unloadMBeans method Unprotected resources unregisterObject method unseal method Untrusted services unwrap method UP (Unified Process) references for secure. [See Secure UP] update method 2nd Upgrades URL rewriting URLClassLoader class URLConnection timeouts Use cases actors diagrams in Secure UP methodology choices online portals 2nd requirements identification system constraints system environment User account provisioning 2nd approaches to architecture centralized model vs. decentralized components of logical differentiators for identity management identity provider infrastructure integration portal integration scenario services User agents User login biometrics in case study use case Usernames JAAS authorization WS-Security UsernameToken class 2nd Users in J2EE UserStore class UUID pattern and profile SAML Secure Logger pattern |