Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] Watermarking Java code Weakest links Web application load-balancing authentication redirection servers in SSL in use cases Web tier patterns services. [See Web services tier] validation Web tier patterns. [See Web tier] Web-based transactions. [See Secure Pipe pattern] Web browser SSO Profile Web of trust models Web Services Definition Language (WSDL) 2nd 3rd 4th Web Services Interoperability Organization (WS-I) Web Services Policy Framework (WS-Policy) Web services policy language (WSPL) Web services tier 2nd 3rd architecture and building blocks communication styles core issues in case study 2nd 3rd 4th in J2EE in Liberty Alliance 2nd infrastructure Java-based providers message-layer security network-layer security operational model policies 2nd 3rd protocols stack references requirements SAML in security patterns 2nd 3rd best practices factor analysis Message Inspector Message Interceptor Gateway pitfalls references Secure Message Router standards 2nd WS-Security. [See WS-Security] XML. [See XML (Extensible Markup Language)] summary Transport-Layer Security WS-I security profile Web tier container managed security strategy in case study 2nd 3rd in J2EE 2nd authentication authorization context propagation from HTTP session tracking reality checks for security patterns 2nd 3rd Authentication Enforcer Authorization Enforcer best practices factor analysis Intercepting Validator Intercepting Web Agent references Secure Base Action Secure Logger Secure Pipe Secure Service Proxy Web.xml file basic HTTP authentication entry client certificate based authentication entry deployment descriptor form based authentication entry WebAgent class in case study Single Sign-on Delegator pattern 2nd Wheel edge in Security Wheel Where in security Which in security White box testing in case study Secure UP 2nd 3rd Who in security Why in security Wireless Toolkit (WTK) 2nd Wireless Transport Layer Security (WTLS) Workflow Engine WorkflowRecipient class wrap method 2nd WriteAppletPolicy.policy file WriteFileApplet.html file WriteFileApplet.java file 2nd WS-I (Web Services Interoperability Organization) WS-I Security profiles WS-Policy (Web Services Policy Framework) WS-Security definitions encryption 2nd in JWSDP motivation namespaces SAML and REL in signatures SOAP messages tokens WSDL (Web Services Definition Language) 2nd 3rd 4th WSPL (Web services policy language) WTK (Wireless Toolkit) 2nd WTLS (Wireless Transport Layer Security) |