Index_T


T

TAZ network, 340, 364
Telnet, 55, 56, 66 “67, 155, 179, 335
Terminal access controller access control system, 67 “68
Thin client, 278
Threat, 9, 376
Threat analysis, 376 “77
Three-key triple data encryption standard, 95
Ticket cookie, 223
Ticket-granting server, 233 “37
Ticket-granting ticket, 234 “36, 240 “41
Time stamping authority, 195
Time-Stamp Protocol, 195
Timing attack, 9
Token bus, 118
Token encryption key, 165
Token Ring, 118
Tool control language, 301
Traffic analysis attack, 156, 319 “32
Traffic padding, 15
Transparent application gateway, 76
Transparent firewall, 66
Transport Control Protocol, 5, 54, 57 “58, 59, 62, 64, 300, 308
Transport Control Protocol connection flag, 55
Transport Control Protocol/Internet Protocol, 60, 71, 117
Transport Control Protocol SYN flooding, 3, 156
Transport layer interface, 143
Transport layer security, 244, 302, 310, 330, 337, 387
Transport Layer Security Protocol, 41, 143, 144, 146
certificates, 175 “78
Handshake Protocol, 171 “73
overview, 171 “75
Record Protocol, 171 “72
Transport Layer Security Working Group, 143, 171, 175
Transport mode, 132
Trapdoor, 287
Triple data encryption standard, 94 “95, 136, 174, 223
TRUSTe, 342
Trusted Computer Security Evaluation Criteria , 13
Trusted functionality, 15
Trusted root certificate, 177
Trusted sites zone, 289
Trusted third party, 98, 100, 186, 195, 215, 217, 233, 332
Trust management, 214, 214 “16
Trustmark, 342
Tunnel, 26
Tunneling Protocol, 119 “20, 122 “24, 127, 179 “81
Tunnel mode, 132, 133, 136
Two-key triple data encryption standard, 95



Security Technologies for the World Wide Web
Security Technologies for the World Wide Web, Second Edition
ISBN: 1580533485
EAN: 2147483647
Year: 2003
Pages: 142
Authors: Rolf Oppliger

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net