Index Q-R

  

S

SADB (SA Database),
salting,
sandbox security model,
SAs (Security Associations),
SASL (Simple Authentication and Security Layer), , ,
S-boxes
Blowfish,
size ,
scalar multiplication, elliptic curves,
schemas, JNDI,
SDK (Software Development Kit)
LDAP,
X.500,
SECIOP (Secure Inter-ORB Protocol),
secret key,
generation, ,
HMAC,
MAC and,
SecretKey object,
secure hashes,
secure transport, XML,
SecureRandom class, ,
security
four pillars of,
needs assessment,
requirements fulfillment,
Security Associations. See SAs
security context components , GSS-API,
security context, databases,
security elements, categories,
security manager,
security mangement, Connector API,
security models,
J2EE,
J2SDK,
sandbox model,
security operation components,
security realms,
Security Requirements for Cryptographic Modules,
SecurityException,
SecurityManager
JVM and,
principal-based access control,
self-signed certificates,
send( ) function,
Server_Socket class,
servers
challenges,
EJB server,
responses,
ServerSocket,
Service Provider Interface,
service providers, key pair generation,
Service tickets (TGS), process modifications,
service( ) method,
services,
servlets,
client-side security,
WAS and,
SESAME (Secure European System for Application in Multi-vendor Environment),
session beans, EJBs,
sessions
socket sessions,
sockets,
SSL,
setMessageDrivenContext method,
setSeed( ) method,
SHA-1 algorithm,
SHA-1 protocol,
shutdownInput( ) function,
SID, WinNT,
Signature class,
signatures
digital certificates,
digital signatures, direct digital signatures,
signed applets,
signed objects, access controller,
Simple Authentication and Security Layer. See SASL
skeletons
ORB,
RMI,
SKIP (Simple Key Management for Internet Protocols),
smart cards, ,
sniffer output example source code,
sniffers,
file system,
Fluke LanMeter,
network attacks,
networks,
SOAP (Simple Object Access Protocol), ,
Web Services encoding and,
WLS and,
social engineering,
socket connections,
socket sessions,
SocketChannel class,
SocketChannel. open ( ) function,
SocketClient class,
SocketImpl class,
SocketPermission class,
sockets
connection-oriented,
JavaSockets,
ports,
socket pairs,
SocketServer class,
SOCKS protocol,
software, virused,
source code
ASN.1 CRL notation,
CertPath initialization example,
Client_Socket class,
client-side security example,
CRL retrieval from LDAP server,
DH key generation,
DHAgreement class, man-in-the-middle attack,
DHSimpleApp class,
Diffie-Hellman example,
doPrivileged action,
DSA file example,
ECCKeyFactory class,
ECCKeyPairGenerator class,
ECCProvider class,
ECCSimpleApp class,
FileInputStream,
GetProviderInfo class,
hashes,
isUserInRole method,
JAASAction class,
jdk1.4 policy file,
JSP example,
keytool interaction,
LoginContext class,
man-in-the-middle attack output,
MD5 implementation,
modular exponential,
modulo examples,
netstate -rn on Windows 2000 machine,
ping output,
ping with IP record route,
PKIXCertPathValidatorResult class,
PKIXParameters class,
Project.Java,
ProjectBean.Java,
project-cmp-rdbms-jar.xml,
ProjectHome.java,
RC4 algorithm,
RichCertificate class,
output,
RichDESKey class,
RichDSA class, DSA Signature sample,
RichDSAKey class,
output,
RichGSSService class, creating security context,
RichGuard class, guarded object example,
RichMAC class,
RichPolicy class, policy example,
RichProvider class,
RichRSACipher, RSA cipher implementation,
RichSeed class,
output,
RMIClient.java,
RSASimpleApp class,
security context wrap method/unwrap method,
server socket creation,
Server_Socket class,
service providers installed,
SHA-1 algorithm,
signing Java2.jar,
Sniffer output example,
SocketChannel connectin completion,
SocketClient class,
SocketServer class,
SSLClient class, SSLSocketFactory,
SSLServer class,
TestBFCipher class, Blowfish example,
TestPBECiphers class, PBE cipher testing,
TestRandomMod class,
TestRSACiphers class, RSA test for cipher,
triple-DES three-key implementation,
triple-DES two-key implementation,
WSDL document skeleton,
X509-based key manager,
XOR function,
SPD (Security Policy Databases), SAs,
SPI (Security Parameter Index),
SPI (Service Provider Interface), , ,
ECC key exchange as,
key management,
key pair implementation,
overview,
SPKM (Simple Public Key GSS-API Mechanism),
SPNEGO (Simple and Protected GSS-API Negotiation Mechanism),
spoofing, IP spoofing,
SSL (Secure Socket Layer),
attacks and,
authentication and,
connections,
handshake,
history of,
HTTP comparison,
layers ,
sessions,
SSL (Secure Socket Libraries),
SSL Handshake Protocol,
SSL Record,
SSL/TLS modes,
SSLContext,
SSLServer class,
SSLServerSocket
client authorization,
JSSE,
listener,
SSLSession,
stacked authentication,
state, JSPs and,
stateful sessions
EJBs,
SSL,
stateless beans,
stealth viruses,
stream algorithms,
stream ciphers, RC4, implementation,
stub
ORB,
RMI,
subcontexts,
subjects,
digital certificates,
JAAS, ,
subkeys, Blowfish,
subnet masks, IP addresses and,
symmetric algorithms
block,
stream,
symmetric ciphers,
symmetric encryption, databases,
symmetric keys, ,
RSA key exchange,
SYN flag, TCP,
  


Java Security Solutions
Java Security Solutions
ISBN: 0764549286
EAN: 2147483647
Year: 2001
Pages: 222

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net