Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Facial recognition

Factor analysis

     for security patterns

     in case study

Factory pattern

Failover

     J2EE network topology

     service

Failure to Enroll (FTE) probability

False Acceptance Rate (FAR) probability 2nd

False Match Rate (FMR) probability

False Non-Match Rate (FNMR) probability

False Reject Rate (FRR) probability 2nd

FAR (False Acceptance Rate) probability 2nd

Fault handling

Fault tolerance

     J2EE network topology

     Message Interceptor Gateway pattern

     Secure Message Router pattern

     Web services patterns

FBI survey

Federal regulations 2nd

Federal Trade Commission survey

Federated affiliates

Federated data exchange

Federated identity 2nd

Federated SSO 2nd

Federation management in Liberty Alliance

Federation services

Federation termination protocol

Federations, cross-domain

fileChanged method

Final classes in Java

Financial losses

     from confidentiality breaches

     reported

Financial Privacy Rule

Financial Services Modernization Act

findApplicationId method

Fine-grained security

Fingerprint matching

     approaches to

     logical architecture

Fingerprints, key

Finished messages

Firewalls

     DMZs for

     for Java Card applets

     Secure Service Proxy pattern

     Web services patterns

     Web tier patterns

     XML 2nd

Flag values in JAAS 2nd

Flexibility in security patterns

     Intercepting Web Agent

     Secure Base Action

     Secure Service Proxy

     Single Sign-on Delegator

FMR (False Match Rate) probability

FNMR (False Non-Match Rate) probability

Forces in security pattern templates

     Assertion Builder

     Audit Interceptor

     Authentication Enforcer

     Authorization Enforcer

     Container Managed Security

     Credential Tokenizer

     Dynamic Service Management

     Intercepting Validator

     Intercepting Web Agent

     Message Inspector

     Message Interceptor Gateway

     Obfuscated Transfer Object

     Password Synchronizer

     Policy Delegate

     Secure Base Action

     Secure Logger

     Secure Message Router

     Secure Pipe

     Secure Service Facade

     Secure Service Proxy

     Secure Session Object

     Single Sign-on Delegator

Form validation

     in XML using Apache Struts

     Web tier patterns

Form-based authentication

     in web.xml

     J2EE 2nd

Form-POST-based redirection

Foundstone Enterprise testing tool

Fowler, Martin

Frameworks, security

     adopting

     in Secure Service Facade pattern

Front Controller pattern 2nd 3rd

FRR (False Reject Rate) probability 2nd

FTE (Failure to Enroll) probability

Full View with Errors pattern

Категории