Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

X-BULK

X-KISS (XML key information services)

     locate service

     validate service

X-KRSS (XML key registration service)

     recovery

     registration

     reissue

     revocation

X.500/LDAP Profile

X.509 certificates. [See Certificates and certificate keys]

X509v3CertToken

XACML (Extensible Access Control Markup Language)

     access control and policy management

     architecture

     data flow

     usage scenarios

         ebXML registry

         policy centralization

         policy stores

         SAML collaboration

         sample policy

         sample requests

         sample scenario

         XACML 2.0 with SAML 2.0

         XACML Kit

     vs. EPAL

     WSPL from

     XACML 2.0

     XML schema definition

XACML kit 2nd

XACML Profile

XCBF (XML Common Biometric Format)

XKMS (XML key management system) 2nd

     issues

     motivation

     specification overview

     Verisign services

     X-BULK

     X-KISS

         locate service

         validate service

    X-KRSS. [See X-KRSS (XML key registration service)]

XLST transform algorithms

XML (Extensible Markup Language)

     encryption

         algorithms

         anatomy

         arbitrary content

         element level

         example scenarios

         motivation

         super encryption

     firewalls

         for performance

         for Web Services

     in J2EE

     in Message Inspector pattern

     in Message Interceptor Gateway pattern

     signatures

         algorithms

         anatomy

         Assertion Builder pattern

         creating

         examples

         in SAML

         motivation

         verifying and validating

     XACML for

XML Common Biometric Format (XCBF)

XML Denial of Service (XML-DOS) attacks

XML Digital Signature algorithm

XML key information services (X-KISS)

     locate service

     validate service

XML key management system. [See XKMS (XML key management system)]

XML key registration service (X-KRSS)

     recovery

     registration

     reissue

     revocation

XML messaging provider strategy

XML Schemas 2nd

     for XACML

     in Message Inspector pattern

     in Message Interceptor Gateway pattern

XML-aware security

     infrastructure

     Message Inspector pattern

     Message Interceptor Gateway pattern

Xpath transform algorithms

XrML (Extensible Rights Markup Language)

XSS (cross-site scripting)

Xverify command

Категории