T



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Tags
     libraries for
     RFID
TakeAction class
Tamper-proofing transformations
Targets
     in case study
    in security patterns
         Audit Interceptor
         Intercepting Validator
         Obfuscated Transfer Object 2nd
         Password Synchronizer
         Secure Session Object
     SPML
     XACML
Technology differentiators
Technology elements in case study 2nd
Templates
     biometrics
     Java System Access Manager
    security pattern. [See Security patterns]
Termination
     biometrics
     identity
     smart card
Testability
     Message Interceptor Gateway pattern
     Secure Message Router pattern
Testing
     black box
     in case study
     Web services patterns
     white box
Theft
     identity
     in Web services
     session
Third-party authentication and authorization
Third-Party Communication pattern
Threat modeling
Threat profiling
     for security patterns
     in case study
Threats to Web services
Three-factor authentication
Tier matrices
Tiers
     in case study
     in J2EE
     in risk analysis
     in security patterns
Time checking strategy
Timeouts
     HTTP sessions
     URLConnections
     Web tier patterns
Timestamps
     Web services patterns
     WS-Security
TLS. [See Transport Layer Security (TLS)]
TOA (trade-off analysis)
     in case study
     in Secure UP
TokenContext class 2nd
TokenContextImpl class
Tokens
     biometrics
    Credential Tokenizer. [See Credential Tokenizer pattern]
     HTTP-POST
     Identity management patterns
     policy
     RSA cryptographic
     smart card
     SSO 2nd
     unified credential token solution
     weak
     WS-Policy
     WS-Security 2nd 3rd
Tolerance level of potential security threats
Top Secret data
Traceability in Web services
Trade-off analysis (TOA)
     in case study
     in Secure UP
Trading partners in use cases
Training
Transactions
     in case study
     in use cases
     J2EE network topology
     Liberty Alliance
    Secure Pipe pattern. [See Secure Pipe pattern]
     Secure Service Facade pattern
transfer method
Transfer object member strategy 2nd
Transfer Object pattern
     and Obfuscated Transfer Object pattern 2nd
     and Secure Session Object pattern
Transform algorithms
Transformation, code
Transparency
     Assertion Builder pattern
     Credential Tokenizer patterns
Transport Layer Security (TLS)
     issues in
     J2EE 2nd 3rd
     JMS
     JSSE
     Web services
     WS-Security
     XML encryption
TRIPLEDES encryption algorithm
Trust models
     for security patterns
     in case study
     LDAP
TrustAnchor class
Trusted certificates
     for applets
     importing
Trusted MIDlets
TrustManager class
TrustManagerFactory class
Trusts in WS-Security
TrustStore property
TSIK services
Tunneling, proxy
Twofish algorithm
Types, Java




Core Security Patterns. Best Practices and Strategies for J2EE, Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net