Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] CA (connector architecture) CA SiteMinder WebAgent Caching in Single Sign-on Delegator pattern CADs (card acceptance devices) Caesar ciphers California, notice of security breach requirements CallbackHandler class 2nd 3rd 4th 5th Callbacks in J2EE Canadian Public Accounting Board Canonical transformations Canonicalization algorithms 2nd CAP (Converted Applet) files Capacitance-based scanners Capstone project Card acceptance devices (CADs) 2nd Card Unique Identifiers (CUIDs) Cards, smart cards. [See Smart cards] CAs (Certificates of Authority) CertPath for certificates issuing revoking for signed applets J2EE Case study architecture 2nd 3rd assumptions challenges conceptual security model conclusion deployment design Business tier 2nd classes in data modeling and objects factor analysis Identity tier infrastructure policy security patterns services in threat profiling tier analysis trust model Web Services tier 2nd Web tier 2nd development lessons learned overview pitfalls references risk analysis and mitigation security patterns 2nd summary trade-off analysis use cases. [See Use cases] Caslon Analytics Privacy Guide Catalog service 2nd Catalogs, security pattern CBEFF (Common Biometric Exchange File Format) CDC (Connected Device Configuration) CDSSO (cross-domain SSO) in identity management in Liberty Alliance Centralization auditing authentication Authorization Enforcer pattern encryption logging 2nd Message Interceptor Gateway pattern policies 2nd routing transaction management validations Web services patterns Centralized model in user account provisioning CER (Crossover Error Rate) probability Certificate revocation lists (CRLs) Certificate Signing Requests (CSRs) 2nd CertificateFactory class 2nd Certificates and certificate keys 2nd CA role certificate chains for applets for JAD files for keytool for SSL importing 2nd in JSSE mutual authentication PKI printing revocation 2nd Secure Pipe pattern security pattern factor analysis tokens 2nd Web tier patterns Certificates of Authority (CAs) CertPath for certificates issuing revoking for signed applets J2EE CertPath classes and interfaces in for certificate chains CertPathBuilder class CertPathValidator class CertStore class CGI in Web tier patterns Challenge-response protocol authentication Change management request (CMR) system ChangeCipherSpec messages 2nd Check Point patterns checkPermission method checkRead method Child nodes in attack trees Children's Online Privacy Protection Act (COPPA) CIM (Common Information Model) Cipher class in JCE 2nd in Secure Logger pattern CipherInputStream class CipherOutputStream class Ciphers asymmetric JCE block stream symmetric CipherState messages Circles of trust in Liberty specifications in Single Sign-on Delegator pattern Claims in WS-Security Class diagrams for security patterns Assertion Builder Audit Interceptor Authentication Enforcer Authorization Enforcer Container Managed Security Credential Tokenizer Dynamic Service Management Intercepting Validator Intercepting Web Agent JAAS Login Module strategy MBean strategy Message Inspector Message Interceptor Gateway Obfuscated Transfer Object Password Synchronizer Policy Delegate Secure Base Action Secure Logger Secure Message Router Secure Pipe Secure Service Facade Secure Service Proxy Secure Session Object Single Sign-on Delegator Classes CertPath in case study JAAS Java JCA JCE JSSE Classification of security patterns ClassLoader CLDC (Connected Limited Device Configuration) Client Device tier, reality checks for Client-certificate authentication Authentication Enforcer pattern in web.xml J2EE ClientHello messages ClientKeyExchange messages Clients Identity Provider Agent strategy in case study in security patterns Assertion Builder Audit Interceptor Authentication Enforcer Container Managed Security Credential Tokenizer Intercepting Validator Intercepting Web Agent Message Inspector Message Interceptor Gateway Obfuscated Transfer Object Password Synchronizer Policy Delegate 2nd Secure Base Action Secure Logger Secure Message Router Secure Pipe Secure Service Proxy Secure Session Object Single Sign-on Delegator 2nd J2EE 2nd 3rd JAAS authentication for JSSE Liberty specifications SAML SASL 2nd server connections 2nd use cases closeService method 2nd closeSSOConnection method Clustered PEP pattern CMR (change management request) system code, Java obfuscation reverse engineering Codebase in Java 2 CodeSource in Java 2 Coding problems Cold Standby pattern Collisions in one-way hash functions Command APDUs commit method LoginModule SAML commitTransactions method Common Biometric Exchange File Format (CBEFF) Common classes in JAAS Common Information Model (CIM) Common Open Policy Service (COPS) Common SAML functions Communication biometrics JGSS Liberty Alliance Web services 2nd Web tier patterns Compact Virtual Machine (CVM) Comparator-checked Fault Tolerant System pattern Compatibility in proprietary systems in Secure Pipe pattern Compiling applets Complexity Assertion Builder pattern Authorization Enforcer pattern personal identification systems Policy Delegate pattern 2nd Secure Pipe pattern Compliance COPPA Data Protection Directive Gramm-Leach-Bliley Act HIPPA in other countries in Security Wheel in Web services patterns justifications Notice of Security Breach Sarbanes-Oxley Act Component security Business tier patterns J2EE authentication authorization context propagation HTTP session tracking users, groups, roles, and realms Web tier Component-managed sign-on Composability issues Computer Security Institute survey Conceptual security model Concurrency Message Inspector pattern Secure Session Object pattern Conditions Parlay policy design SAML assertions Confidentiality 2nd breaches in security patterns Assertion Builder Authentication Enforcer Dynamic Service Management Message Inspector Obfuscated Transfer Object Policy Delegate Secure Logger Secure Pipe Security Wheel Web services 2nd Configuration Assertion Builder pattern in case study insecure J2ME Web services patterns Configuration class Conformance requirements Connected Device Configuration (CDC) Connected Limited Device Configuration (CLDC) Connections client-server 2nd in case study in use cases SSL 2nd Connector architecture (CA) Connector Factory Consequences in security patterns Assertion Builder Audit Interceptor Authentication Enforcer Authorization Enforcer Container Managed Security Credential Tokenizer Dynamic Service Management Intercepting Validator Intercepting Web Agent Message Inspector Message Interceptor Gateway Obfuscated Transfer Object Password Synchronizer Policy Delegate Secure Base Action Secure Logger 2nd Secure Message Router Secure Pipe Secure Service Facade Secure Service Proxy Secure Session Object Single Sign-on Delegator Constants in Java System Access Manager Constraints authorization in use cases Contact cards Container authenticated strategy Container Managed Security pattern consequences forces participants and responsibilities problem reality check related patterns sample code security factors and risks solution strategies structure Container-based security authentication authorization declarative JACC programmatic protection domains in sign-ons in TLS Content encryption in Web services patterns Content-specific policies Context in J2EE in XACML 2nd propagation of Context Object related patterns Authentication Enforcer Authorization Enforcer Secure Base Action Continuity in case study in use cases strategies Control transformations Converted Applet (CAP) files Cookies HTTP session tracking Liberty Alliance COPPA (Children's Online Privacy Protection Act) COPS (Common Open Policy Service) CORBA-based clients Core Web services standards SOAP UDDI WSDL XML Corporations, identity management in Correlation in fingerprint matching in Web services patterns Countermeasures CRC (cyclic-redundancy check) algorithms 2nd create method AddUser AuthenticationStatement Create, read, update, and delete (CRUD) form data createAssertionReply method createAssertionStatement method createAuthenticationStatement method 2nd createCondition method createMBean method createObjectName method createPasswordRequest method createRule method createServerSocket method createService createSocket method createSPMLRequest method 2nd createSSLEngine method createSSOConnection method createSSODConnection method createSSOToken method AssertionContextImpl SSODelegatorFactoryImpl createToken method Credential Collector Credential Tokenizer pattern 2nd and Single Sign-on Delegator pattern consequences forces participants and responsibilities problem reality check related patterns sample code security factors and risks solution strategies structure Credentials delegation of J2EE Liberty Alliance CRLs (certificate revocation lists) 2nd Cross-domain federations Cross-domain SSO (CDSSO), in identity management in Liberty Alliance Cross-site scripting (XSS) Crossover Error Rate (CER) probability CRUD (create, read, update, and delete) form data Cryptographic Service Providers 2nd Cryptographic token interface standard Cryptography. [See Encryption and cryptography] CSRs (Certificate Signing Requests) 2nd CUIDs (Card Unique Identifiers) Custom error handling Custom tag libraries for permissions Customer IT security requirements CVM (Compact Virtual Machine) Cyclic-redundancy check (CRC) algorithms 2nd |