Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] OASIS standards in identity management OASIS Web services. [See WS-Security] XCBF Obfuscated Transfer Object pattern consequences forces in case study 2nd 3rd 4th participants and responsibilities problem reality check related patterns sample code security factors and risks solution strategies structure Obfuscation Business tier patterns in case study 2nd Java code Web tier patterns Obj.conf file Object Name Service (ONS) Objects in case study OCF (OpenCard Framework) OCSP (Online Certificate Status Protocol) 2nd 3rd ODRL (Open Digital Rights Language) One-to-many/one-to-one Policy Delegate One-way hash function algorithms Oneshot MIDlets onFault method Online Certificate Status Protocol (OCSP) 2nd 3rd Online portals 2nd onMessage method AuditRequestMessageBean PasswordSyncLedger PasswordSyncListener ONS (Object Name Service) Open Content model Open Digital Rights Language (ODRL) OpenCard Framework (OCF) OpenSC framework Operating systems 2nd Operational models biometrics smart cards Web services Operational practices Operations Secure UP SPML Optical scanners Optimization Optional flag Orders in case study fulfillment 2nd management placement Origin host verification OS (operating systems) 2nd Output sanitation Over-The-Air (OTA) provisioning techniques Overflow, buffer |