Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] Tags libraries for RFID TakeAction class Tamper-proofing transformations Targets in case study in security patterns Audit Interceptor Intercepting Validator Obfuscated Transfer Object 2nd Password Synchronizer Secure Session Object SPML XACML Technology differentiators Technology elements in case study 2nd Templates biometrics Java System Access Manager security pattern. [See Security patterns] Termination biometrics identity smart card Testability Message Interceptor Gateway pattern Secure Message Router pattern Testing black box in case study Web services patterns white box Theft identity in Web services session Third-party authentication and authorization Third-Party Communication pattern Threat modeling Threat profiling for security patterns in case study Threats to Web services Three-factor authentication Tier matrices Tiers in case study in J2EE in risk analysis in security patterns Time checking strategy Timeouts HTTP sessions URLConnections Web tier patterns Timestamps Web services patterns WS-Security TLS. [See Transport Layer Security (TLS)] TOA (trade-off analysis) in case study in Secure UP TokenContext class 2nd TokenContextImpl class Tokens biometrics Credential Tokenizer. [See Credential Tokenizer pattern] HTTP-POST Identity management patterns policy RSA cryptographic smart card SSO 2nd unified credential token solution weak WS-Policy WS-Security 2nd 3rd Tolerance level of potential security threats Top Secret data Traceability in Web services Trade-off analysis (TOA) in case study in Secure UP Trading partners in use cases Training Transactions in case study in use cases J2EE network topology Liberty Alliance Secure Pipe pattern. [See Secure Pipe pattern] Secure Service Facade pattern transfer method Transfer object member strategy 2nd Transfer Object pattern and Obfuscated Transfer Object pattern 2nd and Secure Session Object pattern Transform algorithms Transformation, code Transparency Assertion Builder pattern Credential Tokenizer patterns Transport Layer Security (TLS) issues in J2EE 2nd 3rd JMS JSSE Web services WS-Security XML encryption TRIPLEDES encryption algorithm Trust models for security patterns in case study LDAP TrustAnchor class Trusted certificates for applets importing Trusted MIDlets TrustManager class TrustManagerFactory class Trusts in WS-Security TrustStore property TSIK services Tunneling, proxy Twofish algorithm Types, Java |