Index_P


P

Packet encoding rules, 191
Packet filter, 52
dynamic, 52, 57 “58
static, 52, 54 “57
Packet-level blocking, 361 “63
Packet logging, 57
Parallel dual- homed firewall, 71
Passive eavesdropping, 33, 168
Passive File Transfer Protocol, 58
Passphrase, 105 “6
Passport credentials, 221
Passport unique identifier, 219 “20, 224
Passport user profile, 220
Passport wallet, 221
Password cracker, 225
Password file, 42 “46
Password security, 216, 227, 232 “33
Password sniffing, 3, 4, 8
Patent claims, 108 “9
Pay-after payment system, 254
Payee, 250, 255
Payer, 250, 255
Pay-now payment system, 254
PayPal, 253
PayWord, 262
PCMCI card, 106
Perfect forward secrecy , 141
Perl language, 301, 305 “6, 333
Personal certificate, 177, 204 “5
Personal digital assistant, 7
Personal firewall, 53
Pervasive security mechanism, 15
Photuris Key Management Protocol, 137
Photuris Plus, 137
Physical security, 90
Platform for Internet content selection, 343, 366 “67, 370
Platform for privacy preferences project, 342 “43
Plug-in application, 273 “75, 284
Point of Presence 3 Protocol, 155
Point-to-Point Protocol, 118 “19, 123
Point-to-Point Protocol extension, 122
Point-to-Point Tunneling Protocol, 122 “24
Post method, 223, 303 “4
Preferred encryption algorithm, 190
Preimage resistant hash function, 91 “92
Prepaid payment system, 254
Presentation attack, 355
Pretty Good Privacy, 270 “71
Pretty Good Privacy certificate, 188 “90
Principal, 232
Privacy enhancing technology, 317, 343
Privacy protection, 317 “24, 341 “44
Privacy seal, 341 “42
Private communication technology, 154
Private digital watermark, 354
Private key, 97, 105, 106, 202, 258, 322
Privilege attribute certificate, 240
Privilege attribute server, 240
Profile cookie, 223
Protocol data unit, 118, 123
Protocol number, 55
Proxied Application Protocol, 179
Proxy auto-configuration , 78 “80, 243
Proxy cache, 39
Proxy-connection header, 24
Proxy server, 25, 39, 59, 68, 77, 179, 181 “82, 291, 293, 324, 330, 361, 363
Pseudorandom bit sequence, 107
Pseudorandom nonce, 140 “41
Public cache-control directive, 39
Public database mapping, 340
Public digital watermark, 354
Public key, 96, 322
Public key certificate, 34, 41, 100, 186
overview, 187 “88
Pretty Good Privacy, 188 “90
X.509, 190 “93
Public key cryptography
overview, 96 “100, 103
provable security, 89
types, 100 “3
Public key cryptography standard 1, 168 “69
Public key digital watermarking, 354 “55
Public key field, 189
Public key infrastructure, 167, 186 “87, 192, 196, 215, 261
Public key infrastructure authentication and authorization infrastructure, 241 “44
Public-Key Infrastructure Working Group, 185, 187, 193 “96
Public switched telephone network, 2, 118, 121
Publius, 340 “41
Pull model, 244
Push model, 244, 324, 364
Python language, 301



Security Technologies for the World Wide Web
Security Technologies for the World Wide Web, Second Edition
ISBN: 1580533485
EAN: 2147483647
Year: 2003
Pages: 142
Authors: Rolf Oppliger

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net