Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] DAP (Directory Access Protocol) Data Encryption Standard (DES) 2nd Data flow in XACML Data injection flaws Data Protection Directive Data Transfer HashMap pattern Data transformations Database communication DCE PAC Profile DDOS (distributed DOS) attacks 2nd Debuggers in white box testing Decentralized model in user account provisioning Declarative auditing Declarative authorization 2nd Declarative security Container Managed Security pattern 2nd EJBs J2EE 2nd Decompiling Java code Decoupling in Audit Interceptor pattern in Intercepting Web Agent pattern validations from presentation logic Decryption. [See Encryption and cryptography] Default settings in Identity management patterns Defensive strategies Delegates and delegations administration EJB tier Policy Delegate pattern. [See Policy Delegate pattern] Web services Delete operation in SPML Deleted data detection DeleteRequest message Deleting keystores Demilitarized Zones (DMZs) 2nd Denial of Service (DOS) attacks in case study Intercepting Web Agent pattern SAML Web services Web tier patterns XKMS Dependencies in WS-Policy Deployed component restrictions Deployment and deployment descriptors in case study J2EE 2nd 3rd 4th 5th 6th patterns-driven security design problems in Web services patterns DES (Data Encryption Standard) 2nd DescriptorStore class Design alchemy of. [See Alchemy of security design] in case study. [See Case study] policy Design patterns Destinations in JMS DestinationSite class 2nd destroy method Detached signatures 2nd Detecting data deletion Developers in J2EE Development in case study Devices in case study in security pattern factor analysis Differentiators Diffie-Hellman (DH) key agreement 2nd Digest authentication digest method 2nd Digester class Digests JCA XML signatures Digital certificates. [See Certificates and certificate keys] Digital Signature Algorithm (DSA) Cryptographic Service Providers XML signatures Digital signatures. [See Signatures] Direct access in Web tier patterns Directive, Data Protection Directories in LDAP Directory Access Protocol (DAP) Directory services 2nd Directory Services Markup Language (DSML) Disassembling Java code Discovery in user account provisioning service Distributed DOS (DDOS) attacks 2nd Distributed Management Task Force (DMTF) Distributed policy stores Distributed security DLLs (dynamically linked libraries) DMTF (Distributed Management Task Force) DMZs (Demilitarized Zones) 2nd doAs method doAsPrivileged method Document style web services doFinal method Domain models domains, protection J2EE Java 2 doPost method for new sessions SingleProxyEndpoint DOS attacks. [See Denial of Service (DOS) attacks] Drivers, JDBC DSA (Digital Signature Algorithm) Cryptographic Service Providers XML signatures DSIG profiles DSML (Directory Services Markup Language) dumpHeaderContents method Duplication in Secure Service Facade pattern Dynamic Service Framework Dynamic Service Management pattern 2nd 3rd consequences forces participants and responsibilities 2nd problem reality check related patterns sample code security factors and risks solution strategies structure Dynamically linked libraries (DLLs) |
Категории