Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] MAC (message authentication code) 2nd Mac class Magnus.conf file Maintainability in security patterns Audit Interceptor Intercepting Web Agent Message Inspector Message Interceptor Gateway Secure Message Router Malicious code prevention. [See Intercepting Validator pattern] Man-in-the-middle (MITM) attacks in case study in SAML in Web services Manageability J2EE network topology Secure Base Action pattern Secure Logger pattern Manifest files Manipulation attacks Mapping in Container Managed Security pattern SAML attributes user account Masked list strategy Match-off-the-card strategy 2nd Match-on-the-card strategy 2nd 3rd Matrix, Effect MBean strategy MBeanFactory class MBeanFactory.java file MBeanManager.java file MBeanServer class MD5 cryptography Cryptographic Service Providers JCA message digests Media in security pattern factor analysis Memory for Secure Session Object pattern in smart cards Memory cards Message authentication code (MAC) 2nd Message authentication encryption Message Configurators 2nd Message digests encryption algorithms for JCA Message injection attacks Message Inspector pattern 2nd consequences forces in case study 2nd 3rd 4th participants and responsibilities problem reality checks related patterns Intercepting Validator Message Interceptor Gateway Secure Message Router security factors and risks solution strategies structure Message Interceptor Gateway pattern 2nd consequences forces in case study 2nd 3rd participants and responsibilities problem reality check related patterns Audit Interceptor Intercepting Web Agent Message Inspector 2nd Secure Message Router security factors and risks solution strategies structure Message replay SAML security provisioning patterns Message Routers Message-handler chain strategy MessageDigest class JCA Secure Logger pattern Messages and message-level security encryption in case study 2nd in use cases PasswordSyncListener SAML for password authentication protocols for translation validation abuses Web services 2nd 3rd Meta-data and schemas 2nd Methodology choices in use cases Methods, Java Microprocessor cards MIDlets components of signed trusted MIDP (Mobile Information Device Profile) Migration in Message Interceptor Gateway pattern SAML 1.1 to SAML 2.0 Mimic scanner attacks Minimization and hardening in Web services patterns Minutiae-based fingerprint matching MITM (man-in-the-middle) attacks in case study in SAML in Web services Mobile Information Device Profile (MIDP) Model MBean strategy Model-View-Controller (MVC) architecture Authentication Enforcer pattern Intercepting Validator pattern Secure Base Action pattern Models biometrics conceptual data domain JWS security smart cards threat trust 2nd 3rd user account provisioning 2nd Web services Modification attacks SAML Secure Logger pattern 2nd Modify operations in SPML ModifyResponse message Modularity Message Inspector pattern Message Interceptor Gateway pattern Secure Message Router pattern Monitoring biometrics Business tier patterns in case study Secure UP 2nd Security Services user account provisioning Web services patterns Web tier patterns Multi service controller Multi-factor and multi-tiered authentication Liberty Alliance sessions using smart cards and biometrics Multiple circles of trust Multiple login attempts Multiple resource profiles Multiple sign-ons 2nd Multithreading strategy Mutual authentication J2EE JSSE Web tier patterns MVC (Model-View-Controller) architecture Authentication Enforcer pattern Intercepting Validator pattern Secure Base Action pattern MyJAASAux.policy file MyPrivilegedAction.java file MySSLClient.java program MySSLServer.java program MyTestAction.java program MyTestLoginModule class |