Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

UDDI (Universal Description, Discovery, and Integration)

     and Secure Logger pattern

     attacks on

     for Web services 2nd

UIDGenerator class

Unclassified data

Unified credential tokens 2nd

Unified Process (UP)

     references for

    secure. [See Secure UP]

Unit testing

Universal Description, Discovery, and Integration (UDDI)

     and Secure Logger pattern

     attacks on

     for Web services 2nd

Unlimited strength cryptography

unloadMBeans method

Unprotected resources

unregisterObject method

unseal method

Untrusted services

unwrap method

UP (Unified Process)

     references for

    secure. [See Secure UP]

update method 2nd

Upgrades

URL rewriting

URLClassLoader class

URLConnection timeouts

Use cases

     actors

     diagrams

     in Secure UP

     methodology choices

     online portals 2nd

     requirements identification

     system constraints

     system environment

User account provisioning 2nd

     approaches to

    architecture

         centralized model vs. decentralized

         components of

         logical

     differentiators for

     identity management

     identity provider infrastructure integration

     portal integration

     scenario

     services

User agents

User login

     biometrics

     in case study

     use case

Usernames

     JAAS authorization

     WS-Security

UsernameToken class 2nd

Users in J2EE

UserStore class

UUID pattern and profile

     SAML

     Secure Logger pattern

Категории