O



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

OASIS standards
     in identity management
    OASIS Web services. [See WS-Security]
     XCBF
Obfuscated Transfer Object pattern
     consequences
     forces
     in case study 2nd 3rd 4th
     participants and responsibilities
     problem
     reality check
     related patterns
     sample code
     security factors and risks
     solution
     strategies
     structure
Obfuscation
     Business tier patterns
     in case study 2nd
     Java code
     Web tier patterns
Obj.conf file
Object Name Service (ONS)
Objects in case study
OCF (OpenCard Framework)
OCSP (Online Certificate Status Protocol) 2nd 3rd
ODRL (Open Digital Rights Language)
One-to-many/one-to-one Policy Delegate
One-way hash function algorithms
Oneshot MIDlets
onFault method
Online Certificate Status Protocol (OCSP) 2nd 3rd
Online portals 2nd
onMessage method
     AuditRequestMessageBean
     PasswordSyncLedger
     PasswordSyncListener
ONS (Object Name Service)
Open Content model
Open Digital Rights Language (ODRL)
OpenCard Framework (OCF)
OpenSC framework
Operating systems 2nd
Operational models
     biometrics
     smart cards
     Web services
Operational practices
Operations
     Secure UP
     SPML
Optical scanners
Optimization
Optional flag
Orders in case study
     fulfillment 2nd
     management
     placement
Origin host verification
OS (operating systems) 2nd
Output sanitation
Over-The-Air (OTA) provisioning techniques
Overflow, buffer




Core Security Patterns. Best Practices and Strategies for J2EE, Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net