Security Technologies for the World Wide Web, Second Edition

D

Data confidentiality, 14, 62, 135, 156

Data encryption standard, 93 “95, 108, 135, 171, 339

Data integrity, 14, 15, 62, 98, 156

Data validation and certification server, 195

Data validation certificate, 195

Decentralized firewall, 53

Delta certificate revocation list, 199

Demilitarized zone, 73, 298, 310

Denial-of-service attack, 3, 4, 276

Deoxyribonucleic acid computer, 90 “91

Destination Internet protocol address, 54, 55

Destination port number, 55, 56

DESX protocol, 339

Dial-up client, 120

Differential fault analysis, 9

Differential power analysis, 9

Diffie-Hellman algorithm, 101 “2, 137, 139 “40, 165 “66, 173, 195, 332 “33

Digest access authentication, 34 “41, 45 “46, 387

Digital coin, 256

Digital copyright labeling, 349, 351 “56

Digital envelope, 103 “5

Digital Millennium Copyright Act, 356 “57

Digital shrink-wrap , 205 “6, 282

Digital signature, 15, 98 “99, 100, 101, 146, 188, 205 “6, 281 “82

legislation, 110 “11

Digital signature giving message recovery, 98 “99

Digital signature standard, 98, 102, 140, 173 “74

Digital signature with appendix, 99

Digital watermarking, 349, 351 “56

Directory information tree, 192

Disable routing/forwarding, 69

Discard action, 131

Distinguished encoding rules, 191

Distinguished name , 187, 191

Distributed computing environment, 145

Domain name system, 23, 27 “28, 63, 187, 363

Domain name system security, 144

Domain of interpretation, 138

Donnerhacke s ActiveX control, 286

Dual- homed firewall, 69 “71

Dynamic packet filtering, 52, 57 “58

Категории