Security Technologies for the World Wide Web, Second Edition

U

Unconditional security, 88 “89

Uniform resource identifier, 23

Uniform resource locator, 23, 26 “27, 222, 228, 337 “40

Uniform resource locator blocking, 361, 363 “65

Uniform resource locator rewriting, 337

Uniform resource name , 23

Universal description discovery and integration, 8

Universal serial bus card, 106, 111

UNIX password encryption, 42 “43

Unlinkability of sender and receiver, 320 “21

Unwanted communication, 52

Usage control, 349 “50

User, BETSI, 270 “71

User-agent header, 24

User authentication, 14, 28, 52, 62

basic, 29 “34

digest access, 34 “41

Kerberos, 232 “33

Telnet server, 67 “68

User authorization, 28, 42

User Datagram Protocol, 54, 63, 121

User Datagram Protocol associate request, 63

Username, 28

User-oriented keying, 130 “31

User password file, 40 “41

User procedures customization, 65

Категории