Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

EBJContext interface

EbXML registry

ECP (Enhanced Client and Proxy) profile

EEPROM in smart cards

EER (Equal Error Rate) probability

Effect Matrix

EIS (Enterprise-information system) tier 2nd

     connector architecture in

     JDBC in

     JMS in

EJB tier in J2EE

     anonymous and unprotected resources

     context propagation from web-tier to

     declarative authorization

     principal delegations

     programmatic authorization

     run-as identity

Ejb-jar.xml deployment descriptor

ejbCreate method

     AuditRequestMessageBean

     SecureSessionFacadeSessionBean

ejbRemove method

EJBs. [See Enterprise Java Beans (EJBs)]

Electronic Product Codes (EPCs)

Element-level encryption

Elgamal cipher

Embedded SQL commands

Enabling technologies for personal identification

     BioAPI

     GINA

     Global Platform

     JAAS

     Java Card API

     OpenCard Framework

     OpenSC framework

     PAM

     PC/SC framework

Encapsulation

     Assertion Builder pattern

     Credential Tokenizer pattern 2nd

     Java

     Secure Base Action pattern

encrypt method

EncryptDecryptionWithAES class

EncryptDecryptWithBlowfish.java program

Encryption and cryptography

     asymmetric ciphers

    certificates in. [See Certificates and certificate keys]

     challenges

     hardware-based

     HTTP-POST

     in authentication

     in case study

     Java 2nd

     JCA

     JCE 2nd

         AES

         PBE

     JGSS

     Obfuscated Transfer Object pattern

     one-way hash function algorithms

     Secure Logger pattern

     Secure Pipe pattern

    signatures in. [See Signatures]

     SSL in

     symmetric ciphers

     TLS in

     weak

     Web services patterns 2nd 3rd

     Web tier patterns

     WS-Security 2nd

    XML. [See XML (Extensible Markup Language)]

EncryptionHelper class

Encryptor class

End-to-end transport layer security

Endpoints in case study

Engine classes

     JCA

     JCE

Enhanced Client and Proxy (ECP) profile

Enrollment systems

     biometrics 2nd

     smart card 2nd

Enterprise Java Beans (EJBs)

     Container Managed Security pattern

     declarative security for

     for programmatic security

     helper classes in

     in case study

Enterprise Privacy Authorization Language (EPAL)

Enterprise-information system (EIS) tier 2nd

     connector architecture in

     JDBC in

     JMS in

EnterpriseService class

Entitlement in Web services

Entity management

Enveloped Signature transform algorithms

Enveloped signatures

Envelopes in SOAP messages

Enveloping signatures

     examples

     XML

Environment setup in Secure UP

EPAL (Enterprise Privacy Authorization Language)

EPCGlobal standards

EPCs (Electronic Product Codes)

Equal Error Rate (EER) probability

ERewards Membership Service. [See Case study]

Errors and error handling

     improper

     reporting

     SPML

     translation

European Union (EU) Data Protection Directive

EventCatalog class

Exclusive canonicalization encryption

execute method

     Policy Delegate pattern

     PolicyDelegateInterface

     Secure Base Action pattern

     SecureSessionFacadeSessionBean

executeAsPrivileged method

Expertise

     Message Interceptor Gateway pattern

     problems in

Exporting

     keystore certificates

     policies for

Exposure risk factor

Extended SPML operations

Extensibility

     Message Inspector pattern

     Message Interceptor Gateway pattern

     Secure Logger pattern

     Secure Message Router pattern

     SPML

     user account provisioning 2nd

Extensible Access Control Markup Language. [See XACML (Extensible Access Control Markup Language)]

Extensible Markup Language. [See XML (Extensible Markup Language)]

Extensible Rights Markup Language (XrML)

External policy server strategy

Extract Adapter pattern

Категории