Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] validate method Validate service validateSecurityContext method validateSecurityToken method Validation certificate chains failures in case study in security patterns Business tier Intercepting Validator. [See Intercepting Validator pattern] Policy Delegate Secure Base Action Secure Service Facade Web services Web tier Liberty Phase 1 X-KISS XML signatures Variables in Java Vendor-independent security Vendor-neutral credential handler Vendor-specific security session management Web services APIs Vendors password management service provisioning Verification biometric certificate chains host name jar files signatures 2nd Web tier patterns verify method VeriSign CA 2nd Version numbers in XACML Vertical scalability in J2EE network topology viewResult method virtual machines CVM JVM KVM VLANs Voice verification VPN access Vulnerabilities, Web services |