M



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

MAC (message authentication code) 2nd
Mac class
Magnus.conf file
Maintainability in security patterns
     Audit Interceptor
     Intercepting Web Agent
     Message Inspector
     Message Interceptor Gateway
     Secure Message Router
Malicious code prevention. [See Intercepting Validator pattern]
Man-in-the-middle (MITM) attacks
     in case study
     in SAML
     in Web services
Manageability
     J2EE network topology
     Secure Base Action pattern
     Secure Logger pattern
Manifest files
Manipulation attacks
Mapping
     in Container Managed Security pattern
     SAML attributes
     user account
Masked list strategy
Match-off-the-card strategy 2nd
Match-on-the-card strategy 2nd 3rd
Matrix, Effect
MBean strategy
MBeanFactory class
MBeanFactory.java file
MBeanManager.java file
MBeanServer class
MD5 cryptography
     Cryptographic Service Providers
     JCA message digests
Media in security pattern factor analysis
Memory
     for Secure Session Object pattern
     in smart cards
Memory cards
Message authentication code (MAC) 2nd
Message authentication encryption
Message Configurators 2nd
Message digests
     encryption algorithms for
     JCA
Message injection attacks
Message Inspector pattern 2nd
     consequences
     forces
     in case study 2nd 3rd 4th
     participants and responsibilities
     problem
     reality checks
     related patterns
         Intercepting Validator
         Message Interceptor Gateway
         Secure Message Router
     security factors and risks
     solution
     strategies
     structure
Message Interceptor Gateway pattern 2nd
     consequences
     forces
     in case study 2nd 3rd
     participants and responsibilities
     problem
     reality check
     related patterns
         Audit Interceptor
         Intercepting Web Agent
         Message Inspector 2nd
         Secure Message Router
     security factors and risks
     solution
     strategies
     structure
Message replay
     SAML
     security provisioning patterns
Message Routers
Message-handler chain strategy
MessageDigest class
     JCA
     Secure Logger pattern
Messages and message-level security
     encryption
     in case study 2nd
     in use cases
     PasswordSyncListener
     SAML
         for password authentication
         protocols for
     translation
     validation abuses
     Web services 2nd 3rd
Meta-data and schemas 2nd
Methodology choices in use cases
Methods, Java
Microprocessor cards
MIDlets
     components of
     signed
     trusted
MIDP (Mobile Information Device Profile)
Migration
     in Message Interceptor Gateway pattern
     SAML 1.1 to SAML 2.0
Mimic scanner attacks
Minimization and hardening in Web services patterns
Minutiae-based fingerprint matching
MITM (man-in-the-middle) attacks
     in case study
     in SAML
     in Web services
Mobile Information Device Profile (MIDP)
Model MBean strategy
Model-View-Controller (MVC) architecture
     Authentication Enforcer pattern
     Intercepting Validator pattern
     Secure Base Action pattern
Models
     biometrics
     conceptual
     data
     domain
     JWS security
     smart cards
     threat
     trust 2nd 3rd
     user account provisioning 2nd
     Web services
Modification attacks
     SAML
     Secure Logger pattern 2nd
Modify operations in SPML
ModifyResponse message
Modularity
     Message Inspector pattern
     Message Interceptor Gateway pattern
     Secure Message Router pattern
Monitoring
     biometrics
     Business tier patterns
     in case study
     Secure UP 2nd
     Security Services
     user account provisioning
     Web services patterns
     Web tier patterns
Multi service controller
Multi-factor and multi-tiered authentication
     Liberty Alliance sessions
     using smart cards and biometrics
Multiple circles of trust
Multiple login attempts
Multiple resource profiles
Multiple sign-ons 2nd
Multithreading strategy
Mutual authentication
     J2EE
     JSSE
     Web tier patterns
MVC (Model-View-Controller) architecture
     Authentication Enforcer pattern
     Intercepting Validator pattern
     Secure Base Action pattern
MyJAASAux.policy file
MyPrivilegedAction.java file
MySSLClient.java program
MySSLServer.java program
MyTestAction.java program
MyTestLoginModule class




Core Security Patterns. Best Practices and Strategies for J2EE, Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net