Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

MAC (message authentication code) 2nd

Mac class

Magnus.conf file

Maintainability in security patterns

     Audit Interceptor

     Intercepting Web Agent

     Message Inspector

     Message Interceptor Gateway

     Secure Message Router

Malicious code prevention. [See Intercepting Validator pattern]

Man-in-the-middle (MITM) attacks

     in case study

     in SAML

     in Web services

Manageability

     J2EE network topology

     Secure Base Action pattern

     Secure Logger pattern

Manifest files

Manipulation attacks

Mapping

     in Container Managed Security pattern

     SAML attributes

     user account

Masked list strategy

Match-off-the-card strategy 2nd

Match-on-the-card strategy 2nd 3rd

Matrix, Effect

MBean strategy

MBeanFactory class

MBeanFactory.java file

MBeanManager.java file

MBeanServer class

MD5 cryptography

     Cryptographic Service Providers

     JCA message digests

Media in security pattern factor analysis

Memory

     for Secure Session Object pattern

     in smart cards

Memory cards

Message authentication code (MAC) 2nd

Message authentication encryption

Message Configurators 2nd

Message digests

     encryption algorithms for

     JCA

Message injection attacks

Message Inspector pattern 2nd

     consequences

     forces

     in case study 2nd 3rd 4th

     participants and responsibilities

     problem

     reality checks

     related patterns

         Intercepting Validator

         Message Interceptor Gateway

         Secure Message Router

     security factors and risks

     solution

     strategies

     structure

Message Interceptor Gateway pattern 2nd

     consequences

     forces

     in case study 2nd 3rd

     participants and responsibilities

     problem

     reality check

     related patterns

         Audit Interceptor

         Intercepting Web Agent

         Message Inspector 2nd

         Secure Message Router

     security factors and risks

     solution

     strategies

     structure

Message replay

     SAML

     security provisioning patterns

Message Routers

Message-handler chain strategy

MessageDigest class

     JCA

     Secure Logger pattern

Messages and message-level security

     encryption

     in case study 2nd

     in use cases

     PasswordSyncListener

     SAML

         for password authentication

         protocols for

     translation

     validation abuses

     Web services 2nd 3rd

Meta-data and schemas 2nd

Methodology choices in use cases

Methods, Java

Microprocessor cards

MIDlets

     components of

     signed

     trusted

MIDP (Mobile Information Device Profile)

Migration

     in Message Interceptor Gateway pattern

     SAML 1.1 to SAML 2.0

Mimic scanner attacks

Minimization and hardening in Web services patterns

Minutiae-based fingerprint matching

MITM (man-in-the-middle) attacks

     in case study

     in SAML

     in Web services

Mobile Information Device Profile (MIDP)

Model MBean strategy

Model-View-Controller (MVC) architecture

     Authentication Enforcer pattern

     Intercepting Validator pattern

     Secure Base Action pattern

Models

     biometrics

     conceptual

     data

     domain

     JWS security

     smart cards

     threat

     trust 2nd 3rd

     user account provisioning 2nd

     Web services

Modification attacks

     SAML

     Secure Logger pattern 2nd

Modify operations in SPML

ModifyResponse message

Modularity

     Message Inspector pattern

     Message Interceptor Gateway pattern

     Secure Message Router pattern

Monitoring

     biometrics

     Business tier patterns

     in case study

     Secure UP 2nd

     Security Services

     user account provisioning

     Web services patterns

     Web tier patterns

Multi service controller

Multi-factor and multi-tiered authentication

     Liberty Alliance sessions

     using smart cards and biometrics

Multiple circles of trust

Multiple login attempts

Multiple resource profiles

Multiple sign-ons 2nd

Multithreading strategy

Mutual authentication

     J2EE

     JSSE

     Web tier patterns

MVC (Model-View-Controller) architecture

     Authentication Enforcer pattern

     Intercepting Validator pattern

     Secure Base Action pattern

MyJAASAux.policy file

MyPrivilegedAction.java file

MySSLClient.java program

MySSLServer.java program

MyTestAction.java program

MyTestLoginModule class

Категории