Security Technologies for the World Wide Web, Second Edition
U
Unconditional security, 88 “89
Uniform resource identifier, 23
Uniform resource locator, 23, 26 “27, 222, 228, 337 “40
Uniform resource locator blocking, 361, 363 “65
Uniform resource locator rewriting, 337
Uniform resource name , 23
Universal description discovery and integration, 8
Universal serial bus card, 106, 111
UNIX password encryption, 42 “43
Unlinkability of sender and receiver, 320 “21
Unwanted communication, 52
Usage control, 349 “50
User, BETSI, 270 “71
User-agent header, 24
User authentication, 14, 28, 52, 62
basic, 29 “34
digest access, 34 “41
Kerberos, 232 “33
Telnet server, 67 “68
User authorization, 28, 42
User Datagram Protocol, 54, 63, 121
User Datagram Protocol associate request, 63
Username, 28
User-oriented keying, 130 “31
User password file, 40 “41
User procedures customization, 65