Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Tags

     libraries for

     RFID

TakeAction class

Tamper-proofing transformations

Targets

     in case study

    in security patterns

         Audit Interceptor

         Intercepting Validator

         Obfuscated Transfer Object 2nd

         Password Synchronizer

         Secure Session Object

     SPML

     XACML

Technology differentiators

Technology elements in case study 2nd

Templates

     biometrics

     Java System Access Manager

    security pattern. [See Security patterns]

Termination

     biometrics

     identity

     smart card

Testability

     Message Interceptor Gateway pattern

     Secure Message Router pattern

Testing

     black box

     in case study

     Web services patterns

     white box

Theft

     identity

     in Web services

     session

Third-party authentication and authorization

Third-Party Communication pattern

Threat modeling

Threat profiling

     for security patterns

     in case study

Threats to Web services

Three-factor authentication

Tier matrices

Tiers

     in case study

     in J2EE

     in risk analysis

     in security patterns

Time checking strategy

Timeouts

     HTTP sessions

     URLConnections

     Web tier patterns

Timestamps

     Web services patterns

     WS-Security

TLS. [See Transport Layer Security (TLS)]

TOA (trade-off analysis)

     in case study

     in Secure UP

TokenContext class 2nd

TokenContextImpl class

Tokens

     biometrics

    Credential Tokenizer. [See Credential Tokenizer pattern]

     HTTP-POST

     Identity management patterns

     policy

     RSA cryptographic

     smart card

     SSO 2nd

     unified credential token solution

     weak

     WS-Policy

     WS-Security 2nd 3rd

Tolerance level of potential security threats

Top Secret data

Traceability in Web services

Trade-off analysis (TOA)

     in case study

     in Secure UP

Trading partners in use cases

Training

Transactions

     in case study

     in use cases

     J2EE network topology

     Liberty Alliance

    Secure Pipe pattern. [See Secure Pipe pattern]

     Secure Service Facade pattern

transfer method

Transfer object member strategy 2nd

Transfer Object pattern

     and Obfuscated Transfer Object pattern 2nd

     and Secure Session Object pattern

Transform algorithms

Transformation, code

Transparency

     Assertion Builder pattern

     Credential Tokenizer patterns

Transport Layer Security (TLS)

     issues in

     J2EE 2nd 3rd

     JMS

     JSSE

     Web services

     WS-Security

     XML encryption

TRIPLEDES encryption algorithm

Trust models

     for security patterns

     in case study

     LDAP

TrustAnchor class

Trusted certificates

     for applets

     importing

Trusted MIDlets

TrustManager class

TrustManagerFactory class

Trusts in WS-Security

TrustStore property

TSIK services

Tunneling, proxy

Twofish algorithm

Types, Java

Категории