C



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

CA (connector architecture)
CA SiteMinder WebAgent
Caching in Single Sign-on Delegator pattern
CADs (card acceptance devices)
Caesar ciphers
California, notice of security breach requirements
CallbackHandler class 2nd 3rd 4th 5th
Callbacks in J2EE
Canadian Public Accounting Board
Canonical transformations
Canonicalization algorithms 2nd
CAP (Converted Applet) files
Capacitance-based scanners
Capstone project
Card acceptance devices (CADs) 2nd
Card Unique Identifiers (CUIDs)
Cards, smart cards. [See Smart cards]
CAs (Certificates of Authority)
     CertPath
    for certificates
         issuing
         revoking
     for signed applets
     J2EE
Case study
     architecture 2nd 3rd
     assumptions
     challenges
     conceptual security model
     conclusion
     deployment
     design
         Business tier 2nd
         classes in
         data modeling and objects
         factor analysis
         Identity tier
         infrastructure
         policy
         security patterns
         services in
         threat profiling
         tier analysis
         trust model
         Web Services tier 2nd
         Web tier 2nd
     development
     lessons learned
     overview
     pitfalls
     references
     risk analysis and mitigation
     security patterns 2nd
     summary
     trade-off analysis
    use cases. [See Use cases]
Caslon Analytics Privacy Guide
Catalog service 2nd
Catalogs, security pattern
CBEFF (Common Biometric Exchange File Format)
CDC (Connected Device Configuration)
CDSSO (cross-domain SSO)
     in identity management
     in Liberty Alliance
Centralization
     auditing
     authentication
     Authorization Enforcer pattern
     encryption
     logging 2nd
     Message Interceptor Gateway pattern
     policies 2nd
     routing
     transaction management
     validations
     Web services patterns
Centralized model in user account provisioning
CER (Crossover Error Rate) probability
Certificate revocation lists (CRLs)
Certificate Signing Requests (CSRs) 2nd
CertificateFactory class 2nd
Certificates and certificate keys 2nd
     CA role
     certificate chains
     for applets
     for JAD files
     for keytool
     for SSL
     importing 2nd
     in JSSE mutual authentication
     PKI
     printing
     revocation 2nd
     Secure Pipe pattern
     security pattern factor analysis
     tokens 2nd
     Web tier patterns
Certificates of Authority (CAs)
     CertPath
    for certificates
         issuing
         revoking
     for signed applets
     J2EE
CertPath
     classes and interfaces in
     for certificate chains
CertPathBuilder class
CertPathValidator class
CertStore class
CGI in Web tier patterns
Challenge-response protocol authentication
Change management request (CMR) system
ChangeCipherSpec messages 2nd
Check Point patterns
checkPermission method
checkRead method
Child nodes in attack trees
Children's Online Privacy Protection Act (COPPA)
CIM (Common Information Model)
Cipher class
     in JCE 2nd
     in Secure Logger pattern
CipherInputStream class
CipherOutputStream class
Ciphers
     asymmetric
    JCE
         block
         stream
     symmetric
CipherState messages
Circles of trust
     in Liberty specifications
     in Single Sign-on Delegator pattern
Claims in WS-Security
Class diagrams for security patterns
     Assertion Builder
     Audit Interceptor
     Authentication Enforcer
     Authorization Enforcer
     Container Managed Security
     Credential Tokenizer
     Dynamic Service Management
     Intercepting Validator
     Intercepting Web Agent
     JAAS Login Module strategy
     MBean strategy
     Message Inspector
     Message Interceptor Gateway
     Obfuscated Transfer Object
     Password Synchronizer
     Policy Delegate
     Secure Base Action
     Secure Logger
     Secure Message Router
     Secure Pipe
     Secure Service Facade
     Secure Service Proxy
     Secure Session Object
     Single Sign-on Delegator
Classes
     CertPath
     in case study
     JAAS
     Java
     JCA
     JCE
     JSSE
Classification of security patterns
ClassLoader
CLDC (Connected Limited Device Configuration)
Client Device tier, reality checks for
Client-certificate authentication
     Authentication Enforcer pattern
     in web.xml
     J2EE
ClientHello messages
ClientKeyExchange messages
Clients
     Identity Provider Agent strategy
     in case study
    in security patterns
         Assertion Builder
         Audit Interceptor
         Authentication Enforcer
         Container Managed Security
         Credential Tokenizer
         Intercepting Validator
         Intercepting Web Agent
         Message Inspector
         Message Interceptor Gateway
         Obfuscated Transfer Object
         Password Synchronizer
         Policy Delegate 2nd
         Secure Base Action
         Secure Logger
         Secure Message Router
         Secure Pipe
         Secure Service Proxy
         Secure Session Object
         Single Sign-on Delegator 2nd
     J2EE 2nd 3rd
     JAAS authentication for
     JSSE
     Liberty specifications
     SAML
     SASL 2nd
     server connections 2nd
     use cases
closeService method 2nd
closeSSOConnection method
Clustered PEP pattern
CMR (change management request) system
code, Java
     obfuscation
     reverse engineering
Codebase in Java 2
CodeSource in Java 2
Coding problems
Cold Standby pattern
Collisions in one-way hash functions
Command APDUs
commit method
     LoginModule
     SAML
commitTransactions method
Common Biometric Exchange File Format (CBEFF)
Common classes in JAAS
Common Information Model (CIM)
Common Open Policy Service (COPS)
Common SAML functions
Communication
     biometrics
     JGSS
     Liberty Alliance
     Web services 2nd
     Web tier patterns
Compact Virtual Machine (CVM)
Comparator-checked Fault Tolerant System pattern
Compatibility
     in proprietary systems
     in Secure Pipe pattern
Compiling applets
Complexity
     Assertion Builder pattern
     Authorization Enforcer pattern
     personal identification systems
     Policy Delegate pattern 2nd
     Secure Pipe pattern
Compliance
     COPPA
     Data Protection Directive
     Gramm-Leach-Bliley Act
     HIPPA
     in other countries
     in Security Wheel
     in Web services patterns
     justifications
     Notice of Security Breach
     Sarbanes-Oxley Act
Component security
     Business tier patterns
     J2EE
         authentication
         authorization
         context propagation
         HTTP session tracking
         users, groups, roles, and realms
         Web tier
Component-managed sign-on
Composability issues
Computer Security Institute survey
Conceptual security model
Concurrency
     Message Inspector pattern
     Secure Session Object pattern
Conditions
     Parlay
     policy design
     SAML assertions
Confidentiality 2nd
     breaches
    in security patterns
         Assertion Builder
         Authentication Enforcer
         Dynamic Service Management
         Message Inspector
         Obfuscated Transfer Object
         Policy Delegate
         Secure Logger
         Secure Pipe
     Security Wheel
     Web services 2nd
Configuration
     Assertion Builder pattern
     in case study
     insecure
     J2ME
     Web services patterns
Configuration class
Conformance requirements
Connected Device Configuration (CDC)
Connected Limited Device Configuration (CLDC)
Connections
     client-server 2nd
     in case study
     in use cases
     SSL 2nd
Connector architecture (CA)
Connector Factory
Consequences in security patterns
     Assertion Builder
     Audit Interceptor
     Authentication Enforcer
     Authorization Enforcer
     Container Managed Security
     Credential Tokenizer
     Dynamic Service Management
     Intercepting Validator
     Intercepting Web Agent
     Message Inspector
     Message Interceptor Gateway
     Obfuscated Transfer Object
     Password Synchronizer
     Policy Delegate
     Secure Base Action
     Secure Logger 2nd
     Secure Message Router
     Secure Pipe
     Secure Service Facade
     Secure Service Proxy
     Secure Session Object
     Single Sign-on Delegator
Constants in Java System Access Manager
Constraints
     authorization
     in use cases
Contact cards
Container authenticated strategy
Container Managed Security pattern
     consequences
     forces
     participants and responsibilities
     problem
     reality check
     related patterns
     sample code
     security factors and risks
     solution
     strategies
     structure
Container-based security
     authentication
     authorization
     declarative
     JACC
     programmatic
     protection domains in
     sign-ons in
     TLS
Content encryption in Web services patterns
Content-specific policies
Context
     in J2EE
     in XACML 2nd
     propagation of
Context Object related patterns
     Authentication Enforcer
     Authorization Enforcer
     Secure Base Action
Continuity
     in case study
     in use cases
     strategies
Control transformations
Converted Applet (CAP) files
Cookies
     HTTP session tracking
     Liberty Alliance
COPPA (Children's Online Privacy Protection Act)
COPS (Common Open Policy Service)
CORBA-based clients
Core Web services standards
     SOAP
     UDDI
     WSDL
     XML
Corporations, identity management in
Correlation
     in fingerprint matching
     in Web services patterns
Countermeasures
CRC (cyclic-redundancy check) algorithms 2nd
create method
     AddUser
     AuthenticationStatement
Create, read, update, and delete (CRUD) form data
createAssertionReply method
createAssertionStatement method
createAuthenticationStatement method 2nd
createCondition method
createMBean method
createObjectName method
createPasswordRequest method
createRule method
createServerSocket method
createService
createSocket method
createSPMLRequest method 2nd
createSSLEngine method
createSSOConnection method
createSSODConnection method
createSSOToken method
     AssertionContextImpl
     SSODelegatorFactoryImpl
createToken method
Credential Collector
Credential Tokenizer pattern 2nd
     and Single Sign-on Delegator pattern
     consequences
     forces
     participants and responsibilities
     problem
     reality check
     related patterns
     sample code
     security factors and risks
     solution
     strategies
     structure
Credentials
     delegation of
     J2EE
     Liberty Alliance
CRLs (certificate revocation lists) 2nd
Cross-domain federations
Cross-domain SSO (CDSSO),
     in identity management
     in Liberty Alliance
Cross-site scripting (XSS)
Crossover Error Rate (CER) probability
CRUD (create, read, update, and delete) form data
Cryptographic Service Providers 2nd
Cryptographic token interface standard
Cryptography. [See Encryption and cryptography]
CSRs (Certificate Signing Requests) 2nd
CUIDs (Card Unique Identifiers)
Custom error handling
Custom tag libraries for permissions
Customer IT security requirements
CVM (Compact Virtual Machine)
Cyclic-redundancy check (CRC) algorithms 2nd




Core Security Patterns. Best Practices and Strategies for J2EE, Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net