Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

K Virtual Machine (KVM)

Kerberos

     in JAAS Login Module strategy

     in JGSS

Kerievsky, Joshua

Key agreement encryption

     JCE

     XML

KeyAgreement class 2nd

KeyFactory class

KeyGenerator class

KeyPairGenerator class

Keys and key management

     asymmetric ciphers

     Credential Tokenizer patterns

     in assessment checklists

    in certificates. [See Certificates and certificate keys]

    key pairs

         in applets

         in JCA

         keytool for

     LDAP 2nd

     PGP

     Secure Logger pattern

     Security Services

     symmetric ciphers

     transport algorithms

    XML. [See XKMS (XML key management system)]

KeyStore class

KeyStore property

Keystore tool 2nd

Keystores

     cryptographic devices based

     databases

     deleting

     exporting certificates from

     importing certificates to

     listing entries in

     passwords for

Keytool tool 2nd

     for CSRs

     for deleting keystores

     for exporting keystore certificates

     for importing keystore certificates

     for keystore databases

     for keystore entry lists

     for keystore passwords

     for printing certificate information

     for private/public key pairs

     for signed applets

     for smart cards

Ktoolbar tool

KVM (K Virtual Machine)

Категории