Index_I


I

Inbound connection, 51, 55 “58
Information Technology Security Evaluation Criteria, 13
Initialization vector, 130, 172, 174
Initiator, 334
Inner network segment, 70
Insider attack, 53
Institute of Electrical and Electronic Engineers, 118
Integrated Network Layer Security Protocol, 126
Integrated services digital network, 118, 121
Integrity certificate, 271
Intellectual property protection, 347 “49
Intermediary, Hypertext Transfer Protocol, 25 “26
Intermediate certificate, 177
Intermediate certificate authority, 192
Intermediate system, 50
International data encryption algorithm, 95
International Electrotechnical Committee, 187, 198, 242
International Organization for Standardization, 125, 143, 187, 198, 242
International Standard 15408, 13
International Telecommunication Union Telecommunication Standardization, 187, 198, 242
Internet, 1 “5, 117, 169
Internet Architecture Board, 4
Internet Assigned Numbers Authority, 133, 156, 157
Internet Engineering Steering Group, 175
Internet Engineering Task Force, 61, 76, 122, 127, 128, 137, 138, 142 “44, 146, 171, 175, 187, 188, 242, 381
Common Authentication Technology Working Group, 239
Public-Key Infrastructure Working Group, 185, 187, 193 “96, 198, 200
Internet Explorer, 7, 77 “78, 154, 176, 181, 201, 202 “5, 207, 273, 275, 286 “89, 326, 327, 343, 368 “71
Internet Inter-ORB Protocol, 63, 179
Internet-Keyed Payments Protocol, 261
Internet key exchange, 128 “29, 136 “41
security association, 139 “40
Internet Key Management Protocol, 127 “28
Internet layer security
architecture, 128 “31
IKE Protocol, 136 “41
implementations , 141 “42
IPsec Protocols, 131 “36
overview, 125 “28
Internet message access protocol, 155, 157
Internet Protocol, 119
address blocking, 361 “63
Secure Tunnel Protocol, 137
version 4, 63, 74, 127
version 6, 63, 74, 76, 127
Internet Protocol security, 124
implementations, 141 “42
protocols, 128, 131 “36
security architecture, 128 “31
security association, 140 “41
Internet Protocol security protocol, 127
Internet Protocol Security Working Group, 127, 128, 137, 142
Internet Security Association and Key Management Protocol, 128, 137, 138
Internet server application programming interface, 299, 309
Internet service provider, 319, 360, 364
Internet Worm, 3, 272
Internet X.509 public key infrastructure, 196
Internet zone, 288
Interpretation attack, 356
Interpreter application, 274
Interprocess communications facility, 143
Intranet, 50
Intranet firewall, 53
Intrusion detection, 381
Intrusion Detection Exchange Format Working Group, 381
Intrusion detection systems, 379, 381 “82
Invisible digital watermark, 353
IPX protocol, 119
IRC protocol, 155
Issuer, 253



Security Technologies for the World Wide Web
Security Technologies for the World Wide Web, Second Edition
ISBN: 1580533485
EAN: 2147483647
Year: 2003
Pages: 142
Authors: Rolf Oppliger

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net