G



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Gambling casino
Gang of Four (GoF) design patterns
Gartner Group report
Gateways
    Message Interceptor Gateway pattern. [See Message Interceptor Gateway pattern]
     Parlay
generateKey method
Generic products, XACML for
genKeyPair method
genPrivate method
genPublic method
getAction method
getAlgorithm method
getAllConfigContext method
getApplicationBufferSize method
getAssertionReply method
getAuthenticationMethod method
getCallerPrincipal method 2nd
getCallersIdentity method
getConfigFile method
getConfigProperties method
getConnection method
getContents method
getContext method
getData method
getEncoded method
getFormat method
getInstance method
     Cipher
     KeyAgreement
     KeyGenerator
     KeyPairGenerator
     MBeanFactory
     MBeanManager
     MessageDigest
     Signature
getMaxInactiveInterval method
getPacketBufferSize method
getPermissions method
getPrincipal method
getProtectionDomain method
getProtocolBinding method
     AssertionContextImpl
     SSOContextImpl
     TokenContextImpl
getRegistryFileName method
getRemoteUser method 2nd
getSecurityInfo method
getSecurityManager method
getServiceName method
getServiceStatus method
getSession method
getSessionInfo method
getSSODelegator method
getSSOTokenMap method
getStatus method
getSubject method
getToken method
     TokenContextImpl
     UsernameToken
getUserPrincipal method 2nd 3rd
GINA (Graphical Identification and Authentication)
GINA Module
     for biometrics
     for smart cards
GLB (Gramm-Leach-Bliley) Act
Global logout
     in identity management
     Liberty Alliance
     SAML
     Single Sign-on Delegator pattern
Global Platform technology
Goals, security
GoF (Gang of Four) design patterns
Gramm-Leach-Bliley (GLB) Act
Grant statement
Granularity
     Container Managed Security pattern
     Intercepting Web Agent pattern
Graphical Identification and Authentication (GINA)
Groups
     identity management
     J2EE
GSS-API




Core Security Patterns. Best Practices and Strategies for J2EE, Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net