V



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

validate method
Validate service
validateSecurityContext method
validateSecurityToken method
Validation
     certificate chains
     failures
     in case study
    in security patterns
         Business tier
        Intercepting Validator. [See Intercepting Validator pattern]
         Policy Delegate
         Secure Base Action
         Secure Service Facade
         Web services
         Web tier
     Liberty Phase 1
     X-KISS
     XML signatures
Variables in Java
Vendor-independent security
Vendor-neutral credential handler
Vendor-specific security
     session management
     Web services APIs
Vendors
     password management
     service provisioning
Verification
     biometric
     certificate chains
     host name
     jar files
     signatures 2nd
     Web tier patterns
verify method
VeriSign CA 2nd
Version numbers in XACML
Vertical scalability in J2EE network topology
viewResult method
virtual machines
     CVM
     JVM
     KVM
VLANs
Voice verification
VPN access
Vulnerabilities, Web services




Core Security Patterns. Best Practices and Strategies for J2EE, Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net