D



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

DAP (Directory Access Protocol)
Data Encryption Standard (DES) 2nd
Data flow in XACML
Data injection flaws
Data Protection Directive
Data Transfer HashMap pattern
Data transformations
Database communication
DCE PAC Profile
DDOS (distributed DOS) attacks 2nd
Debuggers in white box testing
Decentralized model in user account provisioning
Declarative auditing
Declarative authorization 2nd
Declarative security
     Container Managed Security pattern 2nd
     EJBs
     J2EE 2nd
Decompiling Java code
Decoupling
     in Audit Interceptor pattern
     in Intercepting Web Agent pattern
     validations from presentation logic
Decryption. [See Encryption and cryptography]
Default settings in Identity management patterns
Defensive strategies
Delegates and delegations
     administration
     EJB tier
    Policy Delegate pattern. [See Policy Delegate pattern]
     Web services
Delete operation in SPML
Deleted data detection
DeleteRequest message
Deleting keystores
Demilitarized Zones (DMZs) 2nd
Denial of Service (DOS) attacks
     in case study
     Intercepting Web Agent pattern
     SAML
     Web services
     Web tier patterns
     XKMS
Dependencies in WS-Policy
Deployed component restrictions
Deployment and deployment descriptors
     in case study
     J2EE 2nd 3rd 4th 5th 6th
     patterns-driven security design
     problems in
     Web services patterns
DES (Data Encryption Standard) 2nd
DescriptorStore class
Design
    alchemy of. [See Alchemy of security design]
    in case study. [See Case study]
     policy
Design patterns
Destinations in JMS
DestinationSite class 2nd
destroy method
Detached signatures 2nd
Detecting data deletion
Developers in J2EE
Development in case study
Devices
     in case study
     in security pattern factor analysis
Differentiators
Diffie-Hellman (DH) key agreement 2nd
Digest authentication
digest method 2nd
Digester class
Digests
     JCA
     XML signatures
Digital certificates. [See Certificates and certificate keys]
Digital Signature Algorithm (DSA)
     Cryptographic Service Providers
     XML signatures
Digital signatures. [See Signatures]
Direct access in Web tier patterns
Directive, Data Protection
Directories in LDAP
Directory Access Protocol (DAP)
Directory services 2nd
Directory Services Markup Language (DSML)
Disassembling Java code
Discovery
     in user account provisioning
     service
Distributed DOS (DDOS) attacks 2nd
Distributed Management Task Force (DMTF)
Distributed policy stores
Distributed security
DLLs (dynamically linked libraries)
DMTF (Distributed Management Task Force)
DMZs (Demilitarized Zones) 2nd
doAs method
doAsPrivileged method
Document style web services
doFinal method
Domain models
domains, protection
     J2EE
     Java 2
doPost method
     for new sessions
     SingleProxyEndpoint
DOS attacks. [See Denial of Service (DOS) attacks]
Drivers, JDBC
DSA (Digital Signature Algorithm)
     Cryptographic Service Providers
     XML signatures
DSIG profiles
DSML (Directory Services Markup Language)
dumpHeaderContents method
Duplication in Secure Service Facade pattern
Dynamic Service Framework
Dynamic Service Management pattern 2nd 3rd
     consequences
     forces
     participants and responsibilities 2nd
     problem
     reality check
     related patterns
     sample code
     security factors and risks
     solution
     strategies
     structure
Dynamically linked libraries (DLLs)




Core Security Patterns. Best Practices and Strategies for J2EE, Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net