Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Labeling

     in security patterns

     in Security Wheel

Layered Security pattern

LDAP (Lightweight Directory Access Protocol)

     certificate revocation issues

     cryptography challenges

     J2EE

     key management

     random number generation

     SASL 2nd

     trust models

Leaf nodes in attack trees

Ledger 2nd

Legacy systems

     Intercepting Web Agent pattern 2nd

     Password Synchronizer pattern

     Secure Service Proxy pattern

Lessons learned in case study

Liberty Alliance consortium

Liberty Alliance Project

     architecture

     for SAML

     Liberty Phase 1

     Liberty Phase 2

     meta-data and schemas

     relationships

     security mechanisms

     SSO strategy

     usage scenarios

         communication security

         credentials

         federation management

         global logouts

         identity registration and termination

         Java System Access Manager

         multi-tiered authentication

         provider session state maintenance

         single sign-on 2nd

     Web redirection in

     Web services in

Liberty-enabled clients

Liberty-enabled proxies

Libraries

     DLL

     tag

Licenses in WS-Security

Lightweight Directory Access Protocol. [See LDAP (Lightweight Directory Access Protocol)]

Limited View pattern

Load Balancing PEP pattern

Load-balancing in case study

loadRegistry method

Locate service in X-KISS

LogFactory class

Logging

     alteration detection for 2nd

     failures

     in biometrics

     in case study

    in security patterns

         Identity management

         Password Synchronizer

         Policy Delegate

         Secure Base Action

        Secure Logger. [See Secure Logger pattern]

         Single Sign-on Delegator

         Web services

     in Security Wheel

Logging out in JAAS

LoggingHandler.java file

Logical access control

Logical architecture

     biometric systems

     smart cards

     user account provisioning

Logical tiers in J2EE

Logical views in use cases

Login attempts in biometrics

login method

     Authentication Enforcer

     LoginContext 2nd 3rd

     LoginModule

Login service in case study

LoginContext class

     JAAS authentication 2nd

     JAAS Login Module strategy 2nd

LoginModule class

     Authentication Enforcer pattern

     biometrics

     implementing

     providers for

     smart cards

LogManager class

logout method

     LoginContext

     LoginModule

Logout requests in SAML

Loosely coupled architecture

     Intercepting Web Agent pattern

     Secure Service Proxy pattern

Lost smart cards

Low-level KVM security

Категории