U



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

UDDI (Universal Description, Discovery, and Integration)
     and Secure Logger pattern
     attacks on
     for Web services 2nd
UIDGenerator class
Unclassified data
Unified credential tokens 2nd
Unified Process (UP)
     references for
    secure. [See Secure UP]
Unit testing
Universal Description, Discovery, and Integration (UDDI)
     and Secure Logger pattern
     attacks on
     for Web services 2nd
Unlimited strength cryptography
unloadMBeans method
Unprotected resources
unregisterObject method
unseal method
Untrusted services
unwrap method
UP (Unified Process)
     references for
    secure. [See Secure UP]
update method 2nd
Upgrades
URL rewriting
URLClassLoader class
URLConnection timeouts
Use cases
     actors
     diagrams
     in Secure UP
     methodology choices
     online portals 2nd
     requirements identification
     system constraints
     system environment
User account provisioning 2nd
     approaches to
    architecture
         centralized model vs. decentralized
         components of
         logical
     differentiators for
     identity management
     identity provider infrastructure integration
     portal integration
     scenario
     services
User agents
User login
     biometrics
     in case study
     use case
Usernames
     JAAS authorization
     WS-Security
UsernameToken class 2nd
Users in J2EE
UserStore class
UUID pattern and profile
     SAML
     Secure Logger pattern




Core Security Patterns. Best Practices and Strategies for J2EE, Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net