Index_S


S

SAFER K-64/K-128, 95
Salt mechanism, 43
Sandbox, 275, 279 “80, 282 “83
Screened host firewall, 71 “72
Screened subnet firewall, 72 “74
Screening router, 54 “55
Script-aliased common gateway interface, 305
Scripting language, 275 “77
Secondary authentication, 68
Second-preimage resistant hash function, 91
Secret key cryptography, 92 “96, 103
Secret key digital watermarking, 354
Secret-sharing scheme, 341
Secure channel, 90
Secure channel sign-in , 226 “27
Secure data network system, 125, 143
Secured channel, 90
Secure Electronic Payment Protocol, 261
Secure electronic transaction, 259, 261
Secure hash algorithm 1, 92, 134
Secure Hypertext Transfer Protocol, 153 “54, 387
Secure Internet Programming Group, 279
Secure messaging, 145 “46
Secure server, 170
Secure shell, 144, 171
Secure sockets layer, 41, 143, 146, 226, 230, 244, 302, 310, 330, 337, 387
architecture, 155 “59
certificates, 175 “78
Handshake Protocol, 161 “67
history, 153 “55
implementations , 169 “71
Record Protocol, 158 “61
security analysis, 167 “69
version 1/version 2, 154
version 3, 154 “55, 171, 172
Secure transaction technology, 261
Secure Web tunneling, 182
Security administrator tool for analyzing networks, 380
Security association, 124, 129 “30, 133, 138 “41
Security association bundle, 130, 138 “39
Security association database, 129
Security audit trail, 15
Security engineering, 387
Security-Enhanced Application Protocol, 144
Security gateway. See Firewall
Security Hypertext Transfer Protocol, 144
Security identifier, 241
Security Internet gateway. See Firewall
Security label, 15
Security level, 290
Security manager, 280
Security mechanism, 14 “15
Security parameters index, 129
Security policy, 10 “13, 51, 52, 281, 375
Security policy database, 129, 131, 138
Security Protocol 3, 125
Security Protocol 4, 143
Security Protocol identifier, 129
Security recovery, 15
Security scanner, 379 “81
Security service, 14
Security zone, 288 “91
Self-labeling, 367, 369 “70
Self-signature field, 189
Sender anonymity, 320 “21
Sequence number guessing attack, 3, 4
Serial line dial-up, 118
Serial Line Internet Protocol, 118
Server application programming interface, 309
Server configuration, 42 “46
Server hello message, 163 “64, 167
Server key exchange message, 164
Server-side include, 300, 311 “12
Server-side security, 297 “300
Server (site) certificate, 203 “4
Service ticket, 234 “36
SESAME, 145, 240
Session hijacking attack, 156
Session identity field, 162 “63
Session key, 105, 107
Session-unique keying, 130 “31
Set-cookie header, 325
Simple authentication and security layer, 157
Simple distributed security infrastructure, 188
Simple key management for Internet protocols, 137, 138
Simple Mail Transfer Protocol, 55, 321, 335
Simple Object Access Protocol, 7 “8, 146
Simple Object Access Protocol envelope, 8
Simple public key infrastructure, 188
Single sign-in, 217, 222 “28
Single sign-on, 217
SKEME, 137
Smart card, 106, 111
SOCKS, 59 “65
Socksified client/stack, 60, 61, 65
Software publisher certificate, 205 “7
Source Internet Protocol address, 54, 55
Source port number, 55, 56
Specific security mechanism, 14 “15
Spoofing attack, 230, 328
SPX Protocol, 145
SSLeay Protocol, 170
SSLref Protocol, 170
Standardization bodies, 187
Standards for interoperable LAN/MAN security, 118
Standard sign-in, 226
Stateful inspection, 58
Stateless packet filter, 56 “57, 58
Static packet filtering, 52, 54 “57
Station-to-Station Protocol, 137
Status code, 25, 30
Strategic technology protection program, 380
Stream cipher, 93, 174
Strong collision resistant hash function, 91
Strong credential sign-in, 227 “28
Stunnel software, 170
SubScrip Protocol, 262
Swipe Protocol, 126
Switch debit card, 254
Symmetric key cryptography. See Secret key cryptography
System administration, 50



Security Technologies for the World Wide Web
Security Technologies for the World Wide Web, Second Edition
ISBN: 1580533485
EAN: 2147483647
Year: 2003
Pages: 142
Authors: Rolf Oppliger

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net