Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] Facial recognition Factor analysis for security patterns in case study Factory pattern Failover J2EE network topology service Failure to Enroll (FTE) probability False Acceptance Rate (FAR) probability 2nd False Match Rate (FMR) probability False Non-Match Rate (FNMR) probability False Reject Rate (FRR) probability 2nd FAR (False Acceptance Rate) probability 2nd Fault handling Fault tolerance J2EE network topology Message Interceptor Gateway pattern Secure Message Router pattern Web services patterns FBI survey Federal regulations 2nd Federal Trade Commission survey Federated affiliates Federated data exchange Federated identity 2nd Federated SSO 2nd Federation management in Liberty Alliance Federation services Federation termination protocol Federations, cross-domain fileChanged method Final classes in Java Financial losses from confidentiality breaches reported Financial Privacy Rule Financial Services Modernization Act findApplicationId method Fine-grained security Fingerprint matching approaches to logical architecture Fingerprints, key Finished messages Firewalls DMZs for for Java Card applets Secure Service Proxy pattern Web services patterns Web tier patterns XML 2nd Flag values in JAAS 2nd Flexibility in security patterns Intercepting Web Agent Secure Base Action Secure Service Proxy Single Sign-on Delegator FMR (False Match Rate) probability FNMR (False Non-Match Rate) probability Forces in security pattern templates Assertion Builder Audit Interceptor Authentication Enforcer Authorization Enforcer Container Managed Security Credential Tokenizer Dynamic Service Management Intercepting Validator Intercepting Web Agent Message Inspector Message Interceptor Gateway Obfuscated Transfer Object Password Synchronizer Policy Delegate Secure Base Action Secure Logger Secure Message Router Secure Pipe Secure Service Facade Secure Service Proxy Secure Session Object Single Sign-on Delegator Form validation in XML using Apache Struts Web tier patterns Form-based authentication in web.xml J2EE 2nd Form-POST-based redirection Foundstone Enterprise testing tool Fowler, Martin Frameworks, security adopting in Secure Service Facade pattern Front Controller pattern 2nd 3rd FRR (False Reject Rate) probability 2nd FTE (Failure to Enroll) probability Full View with Errors pattern |
Категории