Index_C


C

Caching, 26, 34, 39, 170, 182, 197, 324
Card verification code, 261
Card verification value, 261
Cashlike payment system, 254
CAST-128, 95
CCTA risk analysis and management methodology, 378
Censorship, 359 “60
content blocking, 360 “65
content rating, 360, 365 “71
CERIAS, 53
Certificate, 100, 175 “78, 185 “86
Certificate authority certificate, 201 “3
Certificate-based authentication, 41 “42
Certificate message, 164
Certificate owner information field, 189
Certificate practice statement, 194
Certificate repository, 193, 195, 196 “97
Certificate request message, 164 “65, 194
Certificate revocation, 196 “201
Certificate revocation list, 194, 198 “99, 288
Certificate revocation system, 200
Certificate revocation tree, 200 “1
Certificate verify message, 166
Certification authority, 97, 100, 111, 164, 175 “78, 186, 192, 193, 242
Certification path (certification chain), 192
Challenge handshake authentication protocol, 123
Change Cipher Spec Protocol, 161, 163, 166, 167, 172
Chaum mixing network, 322 “23, 324, 330, 334
Checklike payment system, 254
Children s Online Privacy Protection Act, 229
Chosen ciphertext attack, 168 “69
Cipher block chaining, 94, 174
Cipher feedback, 94
Cipher suite, 302
Circuit-level gateway, 58 “64, 77
Class loader, 280
Client hello message, 162 “63, 167
Client key exchange message, 165, 168 “69
Client-side security, 267 “71
Client software customization, 65
Closed user group , 124
CLUSIF, 378
Code scanning, 292 “93
Code signing, 281 “83, 286 “88
Collision resistant hash function, 91
Collusion attack, 355
Commerce server, 170
Common criteria, 13
Common electronic purse specification, 257
Common gateway interface, 22, 299 “309
Common gateway interface directory, 305 “6
Common gateway interface script, 300 “1, 304 “9
Common Object Request Broker Architecture, 63, 179
Communication security, 15, 62
Component object model, 283
Compression control protocol, 123
Computational security, 88 “90
Computer emergency response team, 3
Computer emergency response team/ coordination center, 3
Computer oracle and password system, 380
Conditional Access for Europe, 257
Connect command, 61
Connection anonymity, 320 “21
Connectionless Network Protocol, 125
Connect method, 180 “81
Content blocking, 360 “65
Content rating and self-determination, 360, 365 “71
Contents scramble system, 350
Cookie, 139, 223 “28, 324 “28
Cookie header, 325
Countermeasure, 9
Crowds system, 331 “33
Cryptographic algorithm, 88
Cryptographic file system, 144
Cryptographic hash function, 91 “92
Cryptographic key protection, 105 “6
Cryptographic message syntax, 195
Cryptographic Protocol, 88
Cryptography, 87 “90, 111 “13
Cryptolope, 350
Cumulative trust model, 190
Customization, 65



Security Technologies for the World Wide Web
Security Technologies for the World Wide Web, Second Edition
ISBN: 1580533485
EAN: 2147483647
Year: 2003
Pages: 142
Authors: Rolf Oppliger

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net