Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

CA (connector architecture)

CA SiteMinder WebAgent

Caching in Single Sign-on Delegator pattern

CADs (card acceptance devices)

Caesar ciphers

California, notice of security breach requirements

CallbackHandler class 2nd 3rd 4th 5th

Callbacks in J2EE

Canadian Public Accounting Board

Canonical transformations

Canonicalization algorithms 2nd

CAP (Converted Applet) files

Capacitance-based scanners

Capstone project

Card acceptance devices (CADs) 2nd

Card Unique Identifiers (CUIDs)

Cards, smart cards. [See Smart cards]

CAs (Certificates of Authority)

     CertPath

    for certificates

         issuing

         revoking

     for signed applets

     J2EE

Case study

     architecture 2nd 3rd

     assumptions

     challenges

     conceptual security model

     conclusion

     deployment

     design

         Business tier 2nd

         classes in

         data modeling and objects

         factor analysis

         Identity tier

         infrastructure

         policy

         security patterns

         services in

         threat profiling

         tier analysis

         trust model

         Web Services tier 2nd

         Web tier 2nd

     development

     lessons learned

     overview

     pitfalls

     references

     risk analysis and mitigation

     security patterns 2nd

     summary

     trade-off analysis

    use cases. [See Use cases]

Caslon Analytics Privacy Guide

Catalog service 2nd

Catalogs, security pattern

CBEFF (Common Biometric Exchange File Format)

CDC (Connected Device Configuration)

CDSSO (cross-domain SSO)

     in identity management

     in Liberty Alliance

Centralization

     auditing

     authentication

     Authorization Enforcer pattern

     encryption

     logging 2nd

     Message Interceptor Gateway pattern

     policies 2nd

     routing

     transaction management

     validations

     Web services patterns

Centralized model in user account provisioning

CER (Crossover Error Rate) probability

Certificate revocation lists (CRLs)

Certificate Signing Requests (CSRs) 2nd

CertificateFactory class 2nd

Certificates and certificate keys 2nd

     CA role

     certificate chains

     for applets

     for JAD files

     for keytool

     for SSL

     importing 2nd

     in JSSE mutual authentication

     PKI

     printing

     revocation 2nd

     Secure Pipe pattern

     security pattern factor analysis

     tokens 2nd

     Web tier patterns

Certificates of Authority (CAs)

     CertPath

    for certificates

         issuing

         revoking

     for signed applets

     J2EE

CertPath

     classes and interfaces in

     for certificate chains

CertPathBuilder class

CertPathValidator class

CertStore class

CGI in Web tier patterns

Challenge-response protocol authentication

Change management request (CMR) system

ChangeCipherSpec messages 2nd

Check Point patterns

checkPermission method

checkRead method

Child nodes in attack trees

Children's Online Privacy Protection Act (COPPA)

CIM (Common Information Model)

Cipher class

     in JCE 2nd

     in Secure Logger pattern

CipherInputStream class

CipherOutputStream class

Ciphers

     asymmetric

    JCE

         block

         stream

     symmetric

CipherState messages

Circles of trust

     in Liberty specifications

     in Single Sign-on Delegator pattern

Claims in WS-Security

Class diagrams for security patterns

     Assertion Builder

     Audit Interceptor

     Authentication Enforcer

     Authorization Enforcer

     Container Managed Security

     Credential Tokenizer

     Dynamic Service Management

     Intercepting Validator

     Intercepting Web Agent

     JAAS Login Module strategy

     MBean strategy

     Message Inspector

     Message Interceptor Gateway

     Obfuscated Transfer Object

     Password Synchronizer

     Policy Delegate

     Secure Base Action

     Secure Logger

     Secure Message Router

     Secure Pipe

     Secure Service Facade

     Secure Service Proxy

     Secure Session Object

     Single Sign-on Delegator

Classes

     CertPath

     in case study

     JAAS

     Java

     JCA

     JCE

     JSSE

Classification of security patterns

ClassLoader

CLDC (Connected Limited Device Configuration)

Client Device tier, reality checks for

Client-certificate authentication

     Authentication Enforcer pattern

     in web.xml

     J2EE

ClientHello messages

ClientKeyExchange messages

Clients

     Identity Provider Agent strategy

     in case study

    in security patterns

         Assertion Builder

         Audit Interceptor

         Authentication Enforcer

         Container Managed Security

         Credential Tokenizer

         Intercepting Validator

         Intercepting Web Agent

         Message Inspector

         Message Interceptor Gateway

         Obfuscated Transfer Object

         Password Synchronizer

         Policy Delegate 2nd

         Secure Base Action

         Secure Logger

         Secure Message Router

         Secure Pipe

         Secure Service Proxy

         Secure Session Object

         Single Sign-on Delegator 2nd

     J2EE 2nd 3rd

     JAAS authentication for

     JSSE

     Liberty specifications

     SAML

     SASL 2nd

     server connections 2nd

     use cases

closeService method 2nd

closeSSOConnection method

Clustered PEP pattern

CMR (change management request) system

code, Java

     obfuscation

     reverse engineering

Codebase in Java 2

CodeSource in Java 2

Coding problems

Cold Standby pattern

Collisions in one-way hash functions

Command APDUs

commit method

     LoginModule

     SAML

commitTransactions method

Common Biometric Exchange File Format (CBEFF)

Common classes in JAAS

Common Information Model (CIM)

Common Open Policy Service (COPS)

Common SAML functions

Communication

     biometrics

     JGSS

     Liberty Alliance

     Web services 2nd

     Web tier patterns

Compact Virtual Machine (CVM)

Comparator-checked Fault Tolerant System pattern

Compatibility

     in proprietary systems

     in Secure Pipe pattern

Compiling applets

Complexity

     Assertion Builder pattern

     Authorization Enforcer pattern

     personal identification systems

     Policy Delegate pattern 2nd

     Secure Pipe pattern

Compliance

     COPPA

     Data Protection Directive

     Gramm-Leach-Bliley Act

     HIPPA

     in other countries

     in Security Wheel

     in Web services patterns

     justifications

     Notice of Security Breach

     Sarbanes-Oxley Act

Component security

     Business tier patterns

     J2EE

         authentication

         authorization

         context propagation

         HTTP session tracking

         users, groups, roles, and realms

         Web tier

Component-managed sign-on

Composability issues

Computer Security Institute survey

Conceptual security model

Concurrency

     Message Inspector pattern

     Secure Session Object pattern

Conditions

     Parlay

     policy design

     SAML assertions

Confidentiality 2nd

     breaches

    in security patterns

         Assertion Builder

         Authentication Enforcer

         Dynamic Service Management

         Message Inspector

         Obfuscated Transfer Object

         Policy Delegate

         Secure Logger

         Secure Pipe

     Security Wheel

     Web services 2nd

Configuration

     Assertion Builder pattern

     in case study

     insecure

     J2ME

     Web services patterns

Configuration class

Conformance requirements

Connected Device Configuration (CDC)

Connected Limited Device Configuration (CLDC)

Connections

     client-server 2nd

     in case study

     in use cases

     SSL 2nd

Connector architecture (CA)

Connector Factory

Consequences in security patterns

     Assertion Builder

     Audit Interceptor

     Authentication Enforcer

     Authorization Enforcer

     Container Managed Security

     Credential Tokenizer

     Dynamic Service Management

     Intercepting Validator

     Intercepting Web Agent

     Message Inspector

     Message Interceptor Gateway

     Obfuscated Transfer Object

     Password Synchronizer

     Policy Delegate

     Secure Base Action

     Secure Logger 2nd

     Secure Message Router

     Secure Pipe

     Secure Service Facade

     Secure Service Proxy

     Secure Session Object

     Single Sign-on Delegator

Constants in Java System Access Manager

Constraints

     authorization

     in use cases

Contact cards

Container authenticated strategy

Container Managed Security pattern

     consequences

     forces

     participants and responsibilities

     problem

     reality check

     related patterns

     sample code

     security factors and risks

     solution

     strategies

     structure

Container-based security

     authentication

     authorization

     declarative

     JACC

     programmatic

     protection domains in

     sign-ons in

     TLS

Content encryption in Web services patterns

Content-specific policies

Context

     in J2EE

     in XACML 2nd

     propagation of

Context Object related patterns

     Authentication Enforcer

     Authorization Enforcer

     Secure Base Action

Continuity

     in case study

     in use cases

     strategies

Control transformations

Converted Applet (CAP) files

Cookies

     HTTP session tracking

     Liberty Alliance

COPPA (Children's Online Privacy Protection Act)

COPS (Common Open Policy Service)

CORBA-based clients

Core Web services standards

     SOAP

     UDDI

     WSDL

     XML

Corporations, identity management in

Correlation

     in fingerprint matching

     in Web services patterns

Countermeasures

CRC (cyclic-redundancy check) algorithms 2nd

create method

     AddUser

     AuthenticationStatement

Create, read, update, and delete (CRUD) form data

createAssertionReply method

createAssertionStatement method

createAuthenticationStatement method 2nd

createCondition method

createMBean method

createObjectName method

createPasswordRequest method

createRule method

createServerSocket method

createService

createSocket method

createSPMLRequest method 2nd

createSSLEngine method

createSSOConnection method

createSSODConnection method

createSSOToken method

     AssertionContextImpl

     SSODelegatorFactoryImpl

createToken method

Credential Collector

Credential Tokenizer pattern 2nd

     and Single Sign-on Delegator pattern

     consequences

     forces

     participants and responsibilities

     problem

     reality check

     related patterns

     sample code

     security factors and risks

     solution

     strategies

     structure

Credentials

     delegation of

     J2EE

     Liberty Alliance

CRLs (certificate revocation lists) 2nd

Cross-domain federations

Cross-domain SSO (CDSSO),

     in identity management

     in Liberty Alliance

Cross-site scripting (XSS)

Crossover Error Rate (CER) probability

CRUD (create, read, update, and delete) form data

Cryptographic Service Providers 2nd

Cryptographic token interface standard

Cryptography. [See Encryption and cryptography]

CSRs (Certificate Signing Requests) 2nd

CUIDs (Card Unique Identifiers)

Custom error handling

Custom tag libraries for permissions

Customer IT security requirements

CVM (Compact Virtual Machine)

Cyclic-redundancy check (CRC) algorithms 2nd

Категории