Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] EBJContext interface EbXML registry ECP (Enhanced Client and Proxy) profile EEPROM in smart cards EER (Equal Error Rate) probability Effect Matrix EIS (Enterprise-information system) tier 2nd connector architecture in JDBC in JMS in EJB tier in J2EE anonymous and unprotected resources context propagation from web-tier to declarative authorization principal delegations programmatic authorization run-as identity Ejb-jar.xml deployment descriptor ejbCreate method AuditRequestMessageBean SecureSessionFacadeSessionBean ejbRemove method EJBs. [See Enterprise Java Beans (EJBs)] Electronic Product Codes (EPCs) Element-level encryption Elgamal cipher Embedded SQL commands Enabling technologies for personal identification BioAPI GINA Global Platform JAAS Java Card API OpenCard Framework OpenSC framework PAM PC/SC framework Encapsulation Assertion Builder pattern Credential Tokenizer pattern 2nd Java Secure Base Action pattern encrypt method EncryptDecryptionWithAES class EncryptDecryptWithBlowfish.java program Encryption and cryptography asymmetric ciphers certificates in. [See Certificates and certificate keys] challenges hardware-based HTTP-POST in authentication in case study Java 2nd JCA JCE 2nd AES PBE JGSS Obfuscated Transfer Object pattern one-way hash function algorithms Secure Logger pattern Secure Pipe pattern signatures in. [See Signatures] SSL in symmetric ciphers TLS in weak Web services patterns 2nd 3rd Web tier patterns WS-Security 2nd XML. [See XML (Extensible Markup Language)] EncryptionHelper class Encryptor class End-to-end transport layer security Endpoints in case study Engine classes JCA JCE Enhanced Client and Proxy (ECP) profile Enrollment systems biometrics 2nd smart card 2nd Enterprise Java Beans (EJBs) Container Managed Security pattern declarative security for for programmatic security helper classes in in case study Enterprise Privacy Authorization Language (EPAL) Enterprise-information system (EIS) tier 2nd connector architecture in JDBC in JMS in EnterpriseService class Entitlement in Web services Entity management Enveloped Signature transform algorithms Enveloped signatures Envelopes in SOAP messages Enveloping signatures examples XML Environment setup in Secure UP EPAL (Enterprise Privacy Authorization Language) EPCGlobal standards EPCs (Electronic Product Codes) Equal Error Rate (EER) probability ERewards Membership Service. [See Case study] Errors and error handling improper reporting SPML translation European Union (EU) Data Protection Directive EventCatalog class Exclusive canonicalization encryption execute method Policy Delegate pattern PolicyDelegateInterface Secure Base Action pattern SecureSessionFacadeSessionBean executeAsPrivileged method Expertise Message Interceptor Gateway pattern problems in Exporting keystore certificates policies for Exposure risk factor Extended SPML operations Extensibility Message Inspector pattern Message Interceptor Gateway pattern Secure Logger pattern Secure Message Router pattern SPML user account provisioning 2nd Extensible Access Control Markup Language. [See XACML (Extensible Access Control Markup Language)] Extensible Markup Language. [See XML (Extensible Markup Language)] Extensible Rights Markup Language (XrML) External policy server strategy Extract Adapter pattern |
Категории