Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

validate method

Validate service

validateSecurityContext method

validateSecurityToken method

Validation

     certificate chains

     failures

     in case study

    in security patterns

         Business tier

        Intercepting Validator. [See Intercepting Validator pattern]

         Policy Delegate

         Secure Base Action

         Secure Service Facade

         Web services

         Web tier

     Liberty Phase 1

     X-KISS

     XML signatures

Variables in Java

Vendor-independent security

Vendor-neutral credential handler

Vendor-specific security

     session management

     Web services APIs

Vendors

     password management

     service provisioning

Verification

     biometric

     certificate chains

     host name

     jar files

     signatures 2nd

     Web tier patterns

verify method

VeriSign CA 2nd

Version numbers in XACML

Vertical scalability in J2EE network topology

viewResult method

virtual machines

     CVM

     JVM

     KVM

VLANs

Voice verification

VPN access

Vulnerabilities, Web services

Категории