R



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

RA (risk analysis)
Radio Frequency Identification (RFID)
RAM
     for Secure Session Object pattern
     in smart cards
Random number generation
Rationale in security design
RBAC profiles
RC6 algorithm
Reactive security
Readers
     RFID
     smart card 2nd
Reality checks 2nd
     Business tier
     Client Device tier
     for administration
     for policies
     for quality of services
     in security pattern templates
         Assertion Builder
         Audit Interceptor
         Authentication Enforcer
         Authorization Enforcer
         Container Managed Security
         Credential Tokenizer
         Dynamic Service Management
         Intercepting Validator
         Intercepting Web Agent
         Message Inspector
         Message Interceptor Gateway
         Obfuscated Transfer Object
         Password Synchronizer
         Policy Delegate
         Secure Base Action
         Secure Logger
         Secure Message Router
         Secure Pipe
         Secure Service Facade
         Secure Service Proxy
         Secure Session Object
         Single Sign-on Delegator
     Integration tier
     Presentation tier
     Web tier
Realms
     for smart cards
     J2EE 2nd
     JAAS
Reconciliation in user account provisioning
Recovery 2nd
     in case study
     in use cases
     in XKMS
     key
     service
Redirection, web
Redundancy in Policy Delegate pattern
Refactoring security design
Reference templates for biometrics
registerObject method
Registration
     identity
     UDDI
Registries
     Dynamic Service Management pattern
     UDDI
     Web services
     XACML
RegistryMonitor class
Regulatory policies
Reissue service, key
REL (Rights Expression Language)
Related patterns in security pattern templates 2nd
     Assertion Builder
     Audit Interceptor
     Authentication Enforcer
     Authorization Enforcer
     Container Managed Security
     Credential Tokenizer
     Dynamic Service Management
     Intercepting Validator
     Intercepting Web Agent
     Message Inspector
     Message Interceptor Gateway
     Obfuscated Transfer Object
     Password Synchronizer
     Policy Delegate
     Secure Base Action
     Secure Logger
     Secure Message Router
     Secure Pipe
     Secure Service Facade
     Secure Service Proxy
     Secure Session Object
     Single Sign-on Delegator
Relationships in Liberty Alliance
Reliability
     Assertion Builder pattern
     Secure Message Router pattern
reloadMBeans method
Remote interface and services
     Secure Service Facade pattern
     Single Sign-on Delegator pattern
removeAssertionReply method
removeAssertionStatement method
removeCompRef method
removeSessionInfo method
removeSSOTokenMap method
Replay attacks
     Intercepting Web Agent pattern
     SAML
     Web services
     XKMS
Reporting practices
     Gramm-Leach-Bliley Act
     Sarbanes-Oxley Act
Reporting services in identity management
Repository
     for biometric information
     SAML
     XACML
Request messages
     Message Inspector pattern 2nd
     Secure Message Router pattern
Request-reply model
     SAML
         attribute assertion
         authentication assertions
     SPML
RequestContext class
     Authentication Enforcer pattern
     Authorization Enforcer pattern
     JAAS Login Module Strategy
Requesters for Web services
Requesting Authority
RequestMessage class
Requests, XACML
Required flag
Requirements
     in use cases
     Secure UP 2nd
     security basics
Requisite flag
Resource principals
Resource profiles
Resources tier
respond method
Response APDUs
Response Message
     Message Inspector pattern
     Message Interceptor Gateway pattern
Retinal analysis
Reusability
    in security patterns
         Authorization Enforcer
         Message Inspector
         Message Interceptor Gateway
         Secure Base Action
         Secure Message Router
     Java components
     password
Reverse engineering Java code
Revocation issues and services
     LDAP
     Single Sign-on Delegator pattern
     X-KRSS
Revoked smart cards
RFID (Radio Frequency Identification)
Rich-client authentication
Rights Expression Language (REL)
Rijndael algorithm
RIPEMD-160 encryption algorithms
Risk analysis (RA)
Risk Analyzer
Risks
     in case study 2nd
     in patterns-driven security design
    in security patterns
         Assertion Builder
         Audit Interceptor
         Authentication Enforcer
         Authorization Enforcer
         Container Managed Security
         Credential Tokenizer
         Dynamic Service Management
         Intercepting Validator
         Intercepting Web Agent
         Message Inspector
         Message Interceptor Gateway
         Obfuscated Transfer Object
         Password Synchronizer
         Policy Delegate
         Secure Base Action
         Secure Logger
         Secure Message Router
         Secure Pipe
         Secure Service Facade
         Secure Service Proxy
         Secure Session Object
         Single Sign-on Delegator
     in security provisioning patterns
     in trust model
     in use cases
     in Web services
RMI socket factories
     client
     server
RMI/IIOP-based clients
ROI study
Roles
     Business tier 2nd
     Container Managed Security pattern
     identity management
     J2EE 2nd
ROM in smart cards
Root certificates
Root nodes in attack trees
Rotate ciphers
Routers. [See Secure Message Router pattern]
RPC style web services
RSA BSAFE Secure-WS toolkit
RSA cipher
RSA-SHA1 algorithm
Rule Engine
Rule-based service integration and invocation
Rules
     EPAL
     in policy design
     XACML
run method
Run-as identity




Core Security Patterns. Best Practices and Strategies for J2EE, Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net