Book Home

Java Security Search this book

Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: C

caching loaded classes: 3.4.1.1. Protected methods in the ClassLoader class
cancelling bytecode verification: 2.2.2.3. Controlling bytecode verification
CAs (certificate authorities): 10.4. Certificates
A.1.3. Adding a Key Entry
revoking certificates: 10.4.5. Revoked Certificates
casting illegally: 2.1. Java Language Security Constructs
2.1. Java Language Security Constructs
Java compiler and: 2.2.1. Compiler Enforcement
virtual machine and: 2.1. Java Language Security Constructs
2.2.3. Runtime Enforcement
catching security exceptions: 4.1.1. Security Managers and the Java API
CBC encryption mode: 13.5. Encrypting Data
certificate entries: 11.2. The KeyStore Class
A.1. The keytool
adding to database: A.1.2. Adding a Certificate Entry
deleting: A.1.5. Deleting Keystore Entries
examining: A.1.6. Examining Keystore Data
managing with policytool: A.3.3. Managing Certificate Entries
modifying: A.1.4. Modifying Keystore Entries
passwords for: A.1.1. Global Options to keytool
A.1.4. Modifying Keystore Entries
certificates: 10. Keys and Certificates
10.4. Certificates
CAs (certificate authorities): 10.4. Certificates
10.4.5. Revoked Certificates
A.1.3. Adding a Key Entry
Certificate class: 10.4. Certificates
D.2. Package java.security.cert
Certificate interface: 10.4. Certificates
CSRs (certificate signing requests): A.1.3. Adding a Key Entry
digital signatures and: 12.1.3. Signing and Certificates
distinguished names (DNs): 11.1.1. Principals
importing/exporting: A.1.6. Examining Keystore Data
java.security.cert quick reference: D.2. Package java.security.cert
printing: A.1.6. Examining Keystore Data
revoked: 10.4.5. Revoked Certificates
D.2. Package java.security.cert
D.2. Package java.security.cert
serialization and: 10.5. Keys, Certificates, and Object Serialization
TBS certificates: 10.4.4. Advanced X509Certificate Methods
10.4.5. Revoked Certificates
when necessary: 10.4. Certificates
X509 certificates
serialization and: 12.1.3. Signing and Certificates
X509Certificate class: 10.4.3. The X509Certificate Class
D.2. Package java.security.cert
X509CRL class: 10.4.5. Revoked Certificates
D.2. Package java.security.cert
X509EncodedKeySpec class: 10.3.3.1. The EncodedKeySpec class
D.4. Package java.security.spec
X509Extension class: D.2. Package java.security.cert
certificates( ), Identity class: B.1.1.1. Using the identity class
CFB encryption mode: 13.5. Encrypting Data
check, determining if in progress: 6.1.2. Protected Instance Variables in the Security Manager
checkAccept( ), SecurityManager class: 4.3.3. Methods Relating to Network Access
6.3.2. Implementing Network Access
checkAccess( ), RMISecurityManager class: 6.3.7.1. The RMI security manager
checkAccess( ), SecurityManager class: 4.3.5. Methods Protecting Program Threads
6.1.1. The Class Loader Depth
default security policy and: 6.3.6. Establishing a Security Policy in 1.2
implementing thread security: 6.3.4. Implementing Thread Security
checkAwtEventQueueAccess( ): 4.3.6. Methods Protecting System Resources
4.3.6. Methods Protecting System Resources
checkClassDepth( ): 6.3.1. Utility Classes
security manager methods with: 6.3.7.2. A complete 1.1 security manager
checkClassLoader( ): 6.3.1. Utility Classes
security manager methods with: 6.3.7.2. A complete 1.1 security manager
checkConnect( ): 4.3.3. Methods Relating to Network Access
connections to source host only: 6.3.2. Implementing Network Access
customizing network security model: 6.3.2. Implementing Network Access
inCheck variable and: 6.1.2. Protected Instance Variables in the Security Manager
RMISecurityManager class: 6.3.7.1. The RMI security manager
checkCreateClassLoader( ): 4.3.4. Methods Protecting the Java Virtual Machine
6.1.1. The Class Loader Depth
checkDelete( ): 4.3.2. Methods Relating to File Access
6.1.1. The Class Loader Depth
checkExec( ): 4.3.4. Methods Protecting the Java Virtual Machine
6.1.1. The Class Loader Depth
default security policy and: 6.3.6. Establishing a Security Policy in 1.2
checkExit( ): 4.3.4. Methods Protecting the Java Virtual Machine
6.1.1. The Class Loader Depth
checkGuard( ): 5.2.3. Using the Permission Class
5.6. Guarded Objects
checkLink( ): 4.3.4. Methods Protecting the Java Virtual Machine
6.1.1. The Class Loader Depth
checkListen( ): 4.3.3. Methods Relating to Network Access
checkMemberAccess( ): 4.3.7. Methods Protecting Security Aspects
6.1.1. The Class Loader Depth
default security policy and: 6.3.6. Establishing a Security Policy in 1.2
RMISecurityManager class: 6.3.7.1. The RMI security manager
checkMulticast( ), SecurityManager class: 4.3.3. Methods Relating to Network Access
checkPackageAccess( ): 3.4.3. Implementing Security Policies in the Class Loader
4.3.7. Methods Protecting Security Aspects
6.2.1. The Class Loader and the Security Manager
6.3.5. Implementing Package Access
RMISecurityManager class: 6.3.7.1. The RMI security manager
checkPackageDefinition( ): 4.3.7. Methods Protecting Security Aspects
6.2.1. The Class Loader and the Security Manager
RMISecurityManager class: 6.3.7.1. The RMI security manager
checkPermission( )
AccessController class: 5.5. The AccessController Class
SecurityManager class: 4.3.4. Methods Protecting the Java Virtual Machine
checkPrintJobAccess( ), SecurityManager class: 4.3.6. Methods Protecting System Resources
checkPropertiesAccess( ): 4.3.6. Methods Protecting System Resources
checkPropertiesAccess( ), SecurityManager class: 4.3.6. Methods Protecting System Resources
checkProperty( ): 5.3. The Policy Class
checkPropertyAccess( ): 4.3.6. Methods Protecting System Resources
6.1.1. The Class Loader Depth
RMISecurityManager class: 6.3.7.1. The RMI security manager
checkPropertyAccess( ), SecurityManager class: 4.3.6. Methods Protecting System Resources
checkRead( ): 4.3.2. Methods Relating to File Access
6.1.1. The Class Loader Depth
RMISecurityManager class: 6.3.7.1. The RMI security manager
security policy for: 6.3.7.3. Implementing the file access methods
checkSecurityAccess( ): 4.3.7. Methods Protecting Security Aspects
8.2.1. Using the Provider Class
8.3.1. The Security Class and the Security Manager
B.1.1.3. The Identity class and the security manager
B.1.2.3. Signers and the security manager
SecurityManager class: B.2.3. IdentityScope and the Security Manager
checkSetFactory( )
RMISecurityManager class: 6.3.7.1. The RMI security manager
SecurityManager class: 4.3.3. Methods Relating to Network Access
4.3.3. Methods Relating to Network Access
checkSystemClipboardAccess( ): 4.3.6. Methods Protecting System Resources
checkTopLevelWindow( ): 4.3.6. Methods Protecting System Resources
4.3.6. Methods Protecting System Resources
6.1.1. The Class Loader Depth
6.3.7.5. Implementing miscellaneous methods
default security policy and: 6.3.6. Establishing a Security Policy in 1.2
RMISecurityManager class: 6.3.7.1. The RMI security manager
checkWrite( ): 4.3.2. Methods Relating to File Access
6.1.1. The Class Loader Depth
RMISecurityManager class: 6.3.7.1. The RMI security manager
security policy for: 6.3.7.3. Implementing the file access methods
cipher algorithms: 13.5.2. Cipher Algorithms
cipher block chaining encryption mode: 13.5. Encrypting Data
Cipher class: 13.2. The Sun Security Provider in the JCE
13.5. Encrypting Data
D.5. Package javax.crypto
implementing: 13.5.3. Implementing the Cipher Class
D.5. Package javax.crypto
NullCipher class: 13.5.1. Using the Cipher Class
D.5. Package javax.crypto
cipher-feedback encryption mode: 13.5. Encrypting Data
cipher streams: 13.6. Cipher Streams
D.5. Package javax.crypto
CipherInputStream class: 13.6.2. The CipherInputStream Class
D.5. Package javax.crypto
CipherOutputStream class: 13.6.1. The CipherOutputStream Class
D.5. Package javax.crypto
CipherSpi class: 13.5.3. Implementing the Cipher Class
D.5. Package javax.crypto
class loaders: 1.3.1. Anatomy of a Java Application
3. Java Class Loaders
asking information of/for security managers: 6.2. Security Managers and the Class Loader
caching loaded classes: 3.4.1.1. Protected methods in the ClassLoader class
choosing: 3.2.6. Choosing the Right Class Loader
ClassLoader class: D.8. Miscellaneous Packages
CLASSPATH variable and: 1.4.2. Built-in Java Application Security
connections to source host only: 6.3.2. Implementing Network Access
delegation model for: 3.6.1. Delegation
depth of: 6.1.1. The Class Loader Depth
extensions to: 3.5. Extensions to the Class Loader
how classes are loaded: 3.2. Anatomy of a Class Loader
3.3. Loading Classes
implementing: 3.4. Implementing a Class Loader
implementing security policies: 3.4.3. Implementing Security Policies in the Class Loader
for JAR files: 3.5.2. A JAR File Class Loader
loading resources with: 3.6.2. Loading Resources
of most recently called class: 6.1. Protected Methods of the Security Manager
namespaces and: 3.1.2. Class Loaders and Namespaces
network permissions in: 6.3.3. Network Permissions in the Class Loader
protection domains and: 5.4. Protection Domains
protocols and: 3.5. Extensions to the Class Loader
RMIClassLoader class: 3.2.3. The RMI Class Loader
3.2.6. Choosing the Right Class Loader
D.8. Miscellaneous Packages
security enforcement: 3.1.1. Class Loaders and Security Enforcement
security manager and: 3.1.1. Class Loaders and Security Enforcement
3.2. Anatomy of a Class Loader
6.1. Protected Methods of the Security Manager
types of: 3.2.1. The Internal Class Loader
URLClassLoader class: D.8. Miscellaneous Packages
ClassCastException: 2.1. Java Language Security Constructs
classDepth( ): 6.1. Protected Methods of the Security Manager
classes
access to members of: 4.3.7. Methods Protecting Security Aspects
for algorithms: 8.1.1. Components of the Architecture
authenticating (see authentication)
class loader depth: 6.1.1. The Class Loader Depth
defining: 3.4.3. Implementing Security Policies in the Class Loader
6.2.1. The Class Loader and the Security Manager
different class loaders and: 3.1.2. Class Loaders and Namespaces
engine classes: 8.1.1. Components of the Architecture
architecture of: 8.4. The Architecture of Engine Classes
for message digests, creating: 9.3. Implementing a MessageDigest Class
involved in calling security manager: 6.1. Protected Methods of the Security Manager
loading: 3.2. Anatomy of a Class Loader
3.3. Loading Classes
3.3. Loading Classes
6.2.1. The Class Loader and the Security Manager
caching loaded classes: 3.4.1.1. Protected methods in the ClassLoader class
delegation model for: 3.6.1. Delegation
from JAR files: 3.5.2. A JAR File Class Loader
from multiple sites: 3.5.1. Loading from Multiple Sites
from URLs: 3.2.5. The URL Class Loader
not verifying: 2.2.2.3. Controlling bytecode verification
protection domains and: 5.4. Protection Domains
resolving: 3.2. Anatomy of a Class Loader
3.4.1.1. Protected methods in the ClassLoader class
of the same package: 3.1.2. Class Loaders and Namespaces
sealed classes: 13.8. Sealed Objects
D.5. Package javax.crypto
SecureClassLoader class: 3.2.4. The Secure Class Loader
D.1. Package java.security
SPI classes: 8.4. The Architecture of Engine Classes
trusted vs. untrusted: 4.2. Trusted and Untrusted Classes
6.1. Protected Methods of the Security Manager
classes, signed: 12.2. Signed Classes
ClassLoader class: 3.4.1. Implementing the ClassLoader Class
caching loaded classes: 3.4.1.1. Protected methods in the ClassLoader class
delegation model for: 3.6.1. Delegation
classLoaderDepth( ): 6.1.1. The Class Loader Depth
CLASSPATH environment variable: 1.4.2. Built-in Java Application Security
4.2. Trusted and Untrusted Classes
client sockets: 4.3.3. Methods Relating to Network Access
clipboard, access to: 4.3.6. Methods Protecting System Resources
CN (common name): 11.1.1. Principals
code sources: 5.1. The CodeSource Class
permissions for (see security policy)
protection domains: 5.4. Protection Domains
5.4. Protection Domains
CODEBASE attribute: 3.1.2. Class Loaders and Namespaces
3.5.1. Loading from Multiple Sites
codeBase entry (policy file): 5.3.1. The Default Policy
codebases
managing with policytool: A.3.1. Managing Policy Codebases
permissions for: A.3.2. Managing Permissions
CodeSource( ): 5.1. The CodeSource Class
CodeSource class: 5.1. The CodeSource Class
D.1. Package java.security
collections of permissions: 5.2.5. Permission Collections
com.sun.crypto.provider.SunJCE class: 13.2. The Sun Security Provider in the JCE
cipher algorithms: 13.5.2. Cipher Algorithms
encryption modes: 13.5. Encrypting Data
key agreement algorithm: 13.7. Symmetric Key Agreement
padding schemes: 13.5. Encrypting Data
commercial software: 7.1. The Need for Authentication
C.2. Third-Party Security Providers
common name (CN): 11.1.1. Principals
compiler
enforcing Java language rules: 2.2.1. Compiler Enforcement
writing illegal code: 2.2.2. The Bytecode Verifier
constants (final variables): 2.1. Java Language Security Constructs
2.2.2. The Bytecode Verifier
containsAlias( ), KeyStore class: 11.2. The KeyStore Class
CRLs (certificate revocation lists): 10.4.5. Revoked Certificates
cryptographic keys: 7.3.2. Cryptographic Keys
public/private key pairs: 7.3.2. Cryptographic Keys
secret keys: 7.3.2. Cryptographic Keys
cryptography
authentication, role of: 7.2. The Role of Authentication
authentication vs. encryption: 7.1.2. Data Authentication
certificates (see certificates)
encryption export restrictions: 13.1. Export Restrictions
encryption strength: 10.2.1. Using the KeyPairGenerator Class
11.3. A Key Management Example
engines for: 7.3. Cryptographic Engines
JCE (see JCE)
keys for (see keys, cryptographic)
reasons for: 7.1. The Need for Authentication
-csr option (keystore): A.1.3. Adding a Key Entry
CSRs (certificate signing requests): A.1.3. Adding a Key Entry
currentClassLoader( ): 6.1. Protected Methods of the Security Manager
currentLoadedClass( ): 6.1. Protected Methods of the Security Manager
custom class loaders: 3.2.6. Choosing the Right Class Loader
customizing
network security model: 6.3.2. Implementing Network Access
security managers: 6. Implementing Security Policies


Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Library Navigation Links

Copyright © 2001 O'Reilly & Associates, Inc. All Rights Reserved.

This HTML Help has been published using the chm2web software.