Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

DAP (Directory Access Protocol)

Data Encryption Standard (DES) 2nd

Data flow in XACML

Data injection flaws

Data Protection Directive

Data Transfer HashMap pattern

Data transformations

Database communication

DCE PAC Profile

DDOS (distributed DOS) attacks 2nd

Debuggers in white box testing

Decentralized model in user account provisioning

Declarative auditing

Declarative authorization 2nd

Declarative security

     Container Managed Security pattern 2nd

     EJBs

     J2EE 2nd

Decompiling Java code

Decoupling

     in Audit Interceptor pattern

     in Intercepting Web Agent pattern

     validations from presentation logic

Decryption. [See Encryption and cryptography]

Default settings in Identity management patterns

Defensive strategies

Delegates and delegations

     administration

     EJB tier

    Policy Delegate pattern. [See Policy Delegate pattern]

     Web services

Delete operation in SPML

Deleted data detection

DeleteRequest message

Deleting keystores

Demilitarized Zones (DMZs) 2nd

Denial of Service (DOS) attacks

     in case study

     Intercepting Web Agent pattern

     SAML

     Web services

     Web tier patterns

     XKMS

Dependencies in WS-Policy

Deployed component restrictions

Deployment and deployment descriptors

     in case study

     J2EE 2nd 3rd 4th 5th 6th

     patterns-driven security design

     problems in

     Web services patterns

DES (Data Encryption Standard) 2nd

DescriptorStore class

Design

    alchemy of. [See Alchemy of security design]

    in case study. [See Case study]

     policy

Design patterns

Destinations in JMS

DestinationSite class 2nd

destroy method

Detached signatures 2nd

Detecting data deletion

Developers in J2EE

Development in case study

Devices

     in case study

     in security pattern factor analysis

Differentiators

Diffie-Hellman (DH) key agreement 2nd

Digest authentication

digest method 2nd

Digester class

Digests

     JCA

     XML signatures

Digital certificates. [See Certificates and certificate keys]

Digital Signature Algorithm (DSA)

     Cryptographic Service Providers

     XML signatures

Digital signatures. [See Signatures]

Direct access in Web tier patterns

Directive, Data Protection

Directories in LDAP

Directory Access Protocol (DAP)

Directory services 2nd

Directory Services Markup Language (DSML)

Disassembling Java code

Discovery

     in user account provisioning

     service

Distributed DOS (DDOS) attacks 2nd

Distributed Management Task Force (DMTF)

Distributed policy stores

Distributed security

DLLs (dynamically linked libraries)

DMTF (Distributed Management Task Force)

DMZs (Demilitarized Zones) 2nd

doAs method

doAsPrivileged method

Document style web services

doFinal method

Domain models

domains, protection

     J2EE

     Java 2

doPost method

     for new sessions

     SingleProxyEndpoint

DOS attacks. [See Denial of Service (DOS) attacks]

Drivers, JDBC

DSA (Digital Signature Algorithm)

     Cryptographic Service Providers

     XML signatures

DSIG profiles

DSML (Directory Services Markup Language)

dumpHeaderContents method

Duplication in Secure Service Facade pattern

Dynamic Service Framework

Dynamic Service Management pattern 2nd 3rd

     consequences

     forces

     participants and responsibilities 2nd

     problem

     reality check

     related patterns

     sample code

     security factors and risks

     solution

     strategies

     structure

Dynamically linked libraries (DLLs)

Категории