Index: S - e-Reading Library
start page  | rating of books | rating of authors | reviews | copyrights
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: S
- sandboxes
 
  
  - description of sandbox model: 1.2. The Java Sandbox
 
  
  - signed classes and: 12.2. Signed Classes
 
  
  - specifying as application argument: 1.4.2. Built-in Java Application Security
 
 
- sealed classes: 13.8. Sealed Objects
 
  - D.5. Package javax.crypto
 
 
- SealedObject class: 13.8. Sealed Objects
 
  - D.5. Package javax.crypto
 
 
- secret keys: 7.3.2. Cryptographic Keys
 
  - 13.3.1. Secret Keys
 
  
  - engines for: 13.4. Secret Key Engines
 
  
  - KeyGenerator class: 13.2. The Sun Security Provider in the JCE
 
    - 13.4.1. The KeyGenerator Class
 
    - D.5. Package javax.crypto
 
  
 
  
  - KeyGeneratorSpi class: D.5. Package javax.crypto
 
  
  - SecretKey class: D.5. Package javax.crypto
 
  
  - SecretKeyFactory class: 13.2. The Sun Security Provider in the JCE
 
    - 13.2. The Sun Security Provider in the JCE
 
    - 13.4.2. The SecretKeyFactory Class
 
    - D.5. Package javax.crypto
 
  
 
  
  - SecretKeyFactorySpi class: 13.4.2.2. The secret key factory SPI
 
    - D.5. Package javax.crypto
 
  
 
 
- secure message digests: 9.1.1. Secure Message Digests
 
- Secure Socket Layer (SSL): 7.1.3. Java's Role in Authentication
 
  - 13.6.3. SSL Encryption
 
 
- SecureClassLoader class: 3.2.4. The Secure Class Loader
 
  - 5.1. The CodeSource Class
 
  - D.1. Package java.security
 
  
  - implementing: 3.4.2. Implementing the SecureClassLoader Class
 
 
- SecureRandom class: D.1. Package java.security
 
- security
 
  
  - aspects of, protecting: 4.3.7. Methods Protecting Security Aspects
 
  
  - bugs: C.1. Security Bugs
 
  
  - built into applications: 1.4.2. Built-in Java Application Security
 
  
  - class loaders and: 3.1. Security and the Class Loader
 
  
  - cryptography (see cryptography)
 
  
  - definition of: 1.1. What Is Security?
 
  
  - encryption exportation laws: 13.1. Export Restrictions
 
  
  - enforcing Java language rules: 2.2. Enforcement of the Java Language Rules
 
  
  - engines for (see engines, security)
 
  
  - file access: 4.3.2. Methods Relating to File Access
 
  
  - jarsigner tool: A.2. The jarsigner Tool
 
  
  - Java language constructs for: 2.1. Java Language Security Constructs
 
  
  - java.policy files,
    
    administering by hand: A.4.2. The java.policy File
 
  
  
  - java.security file: 5.3.1. The Default Policy
 
    
    - administering by hand: A.4.1. The java.security File
 
    
    - code of (Java 1.2): 5.3.1. The Default Policy
 
  
 
  
  - keys (see key, cryptographic)
 
  
  - keytool utility: A.1. The keytool
 
  
  - object serialization and: 2.1.1. Object Serialization and Memory Integrity
 
  
  - operating system and: 1.4. Running a Java Application
 
  
  - policytool tool: A.3. The policytool
 
  
  - protection domains: 5.4. Protection Domains
 
  
  - resources for further reading: C. Security Resources
 
  
  - threats to (see threats)
 
 
- Security class: 8.1.1. Components of the Architecture
 
  - 8.3. The Security Class
 
  - D.1. Package java.security
 
  
  - security manager and: 8.3.1. The Security Class and the Security Manager
 
 
- security exceptions: 4.1.1. Security Managers and the Java API
 
  - 4.1.1. Security Managers and the Java API
 
 
- security managers: 1.3.1. Anatomy of a Java Application
 
  - 4.1. Overview of the Security Manager
 
  
  - access controller and: 5. The Access Controller
 
    - 6.3.6. Establishing a Security Policy in 1.2
 
  
 
  
  - asking information of/for class loader: 6.2. Security Managers and the Class Loader
 
  
  - class loaders and: 3.1.1. Class Loaders and Security Enforcement
 
    - 3.2. Anatomy of a Class Loader
 
  
 
  
  - custom, when to write: 6. Implementing Security Policies
 
  
  - file-access methods: 4.3.2. Methods Relating to File Access
 
  
  - Identity class and: B.1.1.3. The Identity class and the security manager
 
  
  - identity scopes and: B.2.3. IdentityScope and the Security Manager
 
  
  - Java API and: 4.1.1. Security Managers and the Java API
 
  
  - JavaRunner program with (example): 6.4.1. The Secure JavaRunner Program
 
  
  - network-access methods: 4.3.3. Methods Relating to Network Access
 
  
  - null: 6.3.7.2. A complete 1.1 security manager
 
  
  - protected instance variables: 6.1.2. Protected Instance Variables in the Security Manager
 
  
  - protected methods of: 6.1. Protected Methods of the Security Manager
 
  
  - protecting JVM: 4.3.4. Methods Protecting the Java Virtual Machine
 
  
  - protecting security aspects: 4.3.7. Methods Protecting Security Aspects
 
  
  - protecting system resources: 4.3.6. Methods Protecting System Resources
 
  
  - protecting threads: 4.3.5. Methods Protecting Program Threads
 
  
  - for RMI server: 6.3.7.1. The RMI security manager
 
  
  - RMISecurityManager class: 6.3.7.1. The RMI security manager
 
    - D.8. Miscellaneous Packages
 
  
 
  
  - Security class and: 8.3.1. The Security Class and the Security Manager
 
  
  - setting: 4.3.1. Setting a Security Manager
 
  
  - signed JAR files and: 12.2.2. The Signed JAR File and Security Policies
 
  
  - signers and: B.1.2.3. Signers and the security manager
 
  
  - testing: 6.1.1. The Class Loader Depth
 
  
  - trusted vs. untrusted classes: 4.2. Trusted and Untrusted Classes
 
 
- security package (java.security): 1.3.1. Anatomy of a Java Application
 
  
  - permissions to use: 5.2.2. Permissions of the Java API
 
  
  - quick reference: D.1. Package java.security
 
  
  - security providers and: 8.1.1. Components of the Architecture
 
 
- security policy: 5.3. The Policy Class
 
  
  - default: 5.3.1. The Default Policy
 
    - 6.3.6. Establishing a Security Policy in 1.2
 
  
 
  
  - for file acces methods: 6.3.7.3. Implementing the file access methods
 
  
  - implementing from threads: 6.3.4. Implementing Thread Security
 
  
  - implementing in class loader: 3.4.3. Implementing Security Policies in the Class Loader
 
  
  - implementing network access: 6.3.2. Implementing Network Access
 
  
  - in Java 1.2: 6.3.6. Establishing a Security Policy in 1.2
 
  
  - JavaRunner program and (example): 6.4.1. The Secure JavaRunner Program
 
  
  - Launcher application and (example): 6.4.2. The Secure Java Launcher
 
  
  - for networks, threads, packages: 6.3.7.4. Implementing network, thread, and package access
 
  
  - operating system and: 1.4. Running a Java Application
 
  
  - package access: 6.3.5. Implementing Package Access
 
  
  - Policy class: D.1. Package java.security
 
  
  - policy entries: 5.3.1. The Default Policy
 
  
  - PolicyFile class: 5.3. The Policy Class
 
  
  - reading from URLs: 5.3.1. The Default Policy
 
  
  - setting the security manager: 4.3.1. Setting a Security Manager
 
  
  - signed JAR files: 12.2.2. The Signed JAR File and Security Policies
 
  
  - utility classes for implementing: 6.3.1. Utility Classes
 
 
- security providers: 8. Security Providers
 
  
  - adding: 8.1.2. Choosing a Security Provider
 
    - 8.3. The Security Class
 
  
 
  
  - architecture of: 8.1. The Architecture of Security Providers
 
  
  - interface for (SPI): 8.4. The Architecture of Engine Classes
 
  
  - java.security and: 8.1.1. Components of the Architecture
 
  
  - for keystore objects: 11.3. A Key Management Example
 
  
  - listing for virtual machine: 8.3. The Security Class
 
  
  - properties (associations) for: 8.2.2. Implementing the Provider Class
 
  
  - Provider class: 8.1.1. Components of the Architecture
 
    - 8.2. The Provider Class
 
    - D.1. Package java.security
 
  
 
  
  - Sun JCE: 13.2. The Sun Security Provider in the JCE
 
  
  - third-party, list of: C.2. Third-Party Security Providers
 
  
  - translate keys between: 10.3.1. Using the KeyFactory class
 
 
- SecurityException class: 4.1.1. Security Managers and the Java API
 
  - 4.1.1. Security Managers and the Java API
 
 
- SecurityManager class: 4.1.1. Security Managers and the Java API
 
  - 6.3.6. Establishing a Security Policy in 1.2
 
  - D.8. Miscellaneous Packages
 
  
  - implementing in Java 1.2: 6.3.6. Establishing a Security Policy in 1.2
 
  
  - RMISecurityManager class: 6.3.7.1. The RMI security manager
 
    - D.8. Miscellaneous Packages
 
  
 
 
- SecurityPermission class: 5.2.2. Permissions of the Java API
 
  - D.1. Package java.security
 
 
- -selfcert option (keystore): A.1.4. Modifying Keystore Entries
 
- Serializable interface: 2.1.1. Object Serialization and Memory Integrity
 
- serialization: 2.1.1. Object Serialization and Memory Integrity
 
  - 10.5. Keys, Certificates, and Object Serialization
 
  
  - permissions for: 5.2.2. Permissions of the Java API
 
    - D.8. Miscellaneous Packages
 
  
 
  
  - SerializablePermission class: 5.2.2. Permissions of the Java API
 
    - D.8. Miscellaneous Packages
 
  
 
  
  - X509 certificates and: 12.1.3. Signing and Certificates
 
 
- server sockets: 4.3.3. Methods Relating to Network Access
 
- setCertificateEntry( ),
  
  KeyStore class: 11.2. The KeyStore Class
 
- setInfo( ), Identity class: B.1.1.1. Using the identity class
 
  - B.1.1.3. The Identity class and the security manager
 
 
- setKeyPair( ), Signer class: B.1.2.1. Using the Signer class
 
- setParameter( ), Signature class: 12.1.1. Using the Signature Class
 
- setPolicy( ), Policy class: 5.3. The Policy Class
 
- setPriority( ), Thread class: 2.1. Java Language Security Constructs
 
- setPublicKey( ), Identity class: B.1.1.1. Using the identity class
 
  - B.1.1.3. The Identity class and the security manager
 
 
- setSecurityManager( ), SecurityManager class: 4.3.1. Setting a Security Manager
 
- setSystemScope( ), IdentityScope class: B.2.3. IdentityScope and the Security Manager
 
- setting the security manager: 4.3.1. Setting a Security Manager
 
- .SF filename extension: 12.2.1. Reading Signed JAR Files
 
- shared identity scope: B.3.3. A Shared System Identity Scope
 
- sharing keystores: 11.3. A Key Management Example
 
- -sigalg option (keytool): A.1.3. Adding a Key Entry
 
  - A.1.3. Adding a Key Entry
 
 
- -sigfile option (jarsigner): A.2.1. Creating a Signed JAR File
 
- sign( ), Signature class: 12.1.1. Using the Signature Class
 
  - 12.1.1. Using the Signature Class
 
 
- Signature class: 12.1. The Signature Class
 
  - D.1. Package java.security
 
  
  - implementing: 12.3. Implementing a Signature Class
 
  
  - MessageDigest class vs.: 12.1.1. Using the Signature Class
 
 
- signature files: 12.2.1. Reading Signed JAR Files
 
- signatures (see digital signatures)
 
- SignatureSpi class: D.1. Package java.security
 
- signed classes: 12.2. Signed Classes
 
- signed JAR files
 
  
  - reading: 12.2.1. Reading Signed JAR Files
 
  
  - security policy and: 12.2.2. The Signed JAR File and Security Policies
 
 
- signedBy entry (policy file): 5.3.1. The Default Policy
 
- -signedjar option (jarsigner): A.2.1. Creating a Signed JAR File
 
- SignedObject class: 12.1.2. The SignedObject Class
 
  - D.1. Package java.security
 
 
- Signer class: B.1.2. Signers
 
  - B.3.2. Implementing a Signer Class
 
  - D.1. Package java.security
 
 
- signer entry (policy file): 5.3.1. The Default Policy
 
- SIGNER.DSA file: A.2. The jarsigner Tool
 
- SIGNER.SF file: A.2. The jarsigner Tool
 
- signing JAR files: A.2.1. Creating a Signed JAR File
 
- size( )
 
  
  - IdentityScope class: B.2.1. Using the IdentityScope Class
 
  
  - KeyStore class: 11.2. The KeyStore Class
 
 
- snooping: 7.1.2. Data Authentication
 
- socket factories: 4.3.3. Methods Relating to Network Access
 
  - 4.3.3. Methods Relating to Network Access
 
 
- sockets: 4.3.3. Methods Relating to Network Access
 
  
  - multicast, permissions for: 5.2.2. Permissions of the Java API
 
    - 6.3.6. Establishing a Security Policy in 1.2
 
    - D.8. Miscellaneous Packages
 
  
 
  
  - permissions for: 5.2.2. Permissions of the Java API
 
    - 6.3.6. Establishing a Security Policy in 1.2
 
    - D.8. Miscellaneous Packages
 
  
 
  
  - SocketPermission class: 5.2.2. Permissions of the Java API
 
    - 6.3.6. Establishing a Security Policy in 1.2
 
    - D.8. Miscellaneous Packages
 
  
 
 
- software, commercial: 7.1. The Need for Authentication
 
  - C.2. Third-Party Security Providers
 
 
- SPI (security provider interface): 8.4. The Architecture of Engine Classes
 
- spoofing: 7.1.1. Author Authentication
 
  - C.1.1. Java Security Bugs
 
 
- SSL encryption: 7.1.3. Java's Role in Authentication
 
  - 13.6.3. SSL Encryption
 
 
- SSLSocket class: 13.6.3. SSL Encryption
 
- stack trace of threads: 5.5. The AccessController Class
 
- state, object: 2.1.1. Object Serialization and Memory Integrity
 
- store( ), KeyStore class: 11.2. The KeyStore Class
 
- -storepass option (jarsigner): A.2.1. Creating a Signed JAR File
 
- -storepass option (keytool): A.1.1. Global Options to keytool
 
- -storepassword option (keystore): A.1.8. Miscellaneous Commands
 
- streams
 
  
  - cipher streams: 13.6. Cipher Streams
 
    - D.5. Package javax.crypto
 
  
 
  
  - digest streams: D.1. Package java.security
 
  
  - message digest: 9.2. Message Digest Streams
 
 
- strength, encryption: 10.2.1. Using the KeyPairGenerator Class
 
  - 11.3. A Key Management Example
 
 
- StrictSecurityManager class (example): 6.3.7.2. A complete 1.1 security manager
 
- Sun JCE security provider: 13.2. The Sun Security Provider in the JCE
 
  
  - cipher algorithms: 13.5.2. Cipher Algorithms
 
  
  - encryption modes: 13.5. Encrypting Data
 
  
  - key agreement algorithm: 13.7. Symmetric Key Agreement
 
  
  - padding schemes: 13.5. Encrypting Data
 
 
- sun.security.X509.X509CertImpl class: 12.1.3. Signing and Certificates
 
- SunJCE class: 13.2. The Sun Security Provider in the JCE
 
  
  - cipher algorithms: 13.5.2. Cipher Algorithms
 
  
  - encryption modes: 13.5. Encrypting Data
 
  
  - key agreement algorithm: 13.7. Symmetric Key Agreement
 
  
  - padding schemes: 13.5. Encrypting Data
 
 
- sun.misc.Launcher class: 1.4.2. Built-in Java Application Security
 
- symmetric key agreements: 13.7. Symmetric Key Agreement
 
- system resources 
  
  protecting with security managers: 4.3.6. Methods Protecting System Resources
 
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2001
O'Reilly & Associates, Inc.
All Rights Reserved.