Book Home

Java Security Search this book

Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: P

package (default) access level: 2.1. Java Language Security Constructs
packages
access to: 4.3.7. Methods Protecting Security Aspects
6.3.5. Implementing Package Access
classes of the same: 3.1.2. Class Loaders and Namespaces
defining classes in: 3.4.3. Implementing Security Policies in the Class Loader
security policy for: 6.3.7.4. Implementing network, thread, and package access
padding schemes: 13.5. Encrypting Data
13.5. Encrypting Data
13.6.1. The CipherOutputStream Class
pairs of cryptographic keys: 7.3.2. Cryptographic Keys
DSAKeyPairGenerator interface: D.3. Package java.security.interfaces
DSAPrivateKey, DSAPublicKey interfaces: 10.1.1.1. DSA keys
D.3. Package java.security.interfaces
D.3. Package java.security.interfaces
DSAPublicKeySpec, DSAPrivateKeySpec classes: 10.3.3.2. The AlgorithmParameterSpec interface
D.4. Package java.security.spec
factories (see keys, cryptographic; key factories)
key pair generators: 10.2. The KeyPairGenerator Class
implementing: 10.2.3. Implementing a Key Pair Generator
KeyPair class: 10.1.2. The KeyPair Class
D.1. Package java.security
KeyPairGenerator class: D.1. Package java.security
KeyPairGeneratorSpi class: D.1. Package java.security
symmetric key agreements: 13.7. Symmetric Key Agreement
passwords
for keystore entries: A.1.1. Global Options to keytool
A.1.4. Modifying Keystore Entries
for keystores: 11.2. The KeyStore Class
11.3. A Key Management Example
A.1.1. Global Options to keytool
A.1.8. Miscellaneous Commands
for message digests: 9.1.1. Secure Message Digests
patents on encryption technologies: 13.1. Export Restrictions
PBEKeySpec class: 13.4.2.1. Secret key specifications
D.7. Package javax.crypto.spec
PBEParameterSpec class: 13.4.2.1. Secret key specifications
D.7. Package javax.crypto.spec
PBEWithMD5AndDES algorithm: 13.5.2. Cipher Algorithms
PCBC encryption mode: 13.5. Encrypting Data
performance
delayed bytecode verification: 2.2.2.2. Delayed bytecode verification
JAR files: 3.5.2. A JAR File Class Loader
Permission( ), Permission class: 5.2.3. Using the Permission Class
permissions: 5.2. Permissions
5.2. Permissions
(see also access controller)
BasicPermission class: 5.2.4. The BasicPermission Class
codebase, managing: A.3.2. Managing Permissions
granting all: 5.2.2. Permissions of the Java API
guarded objects: 5.6. Guarded Objects
Java API: 5.2.2. Permissions of the Java API
Java properties: 5.2.2. Permissions of the Java API
D.8. Miscellaneous Packages
Java runtime: 5.2.2. Permissions of the Java API
6.3.6. Establishing a Security Policy in 1.2
D.8. Miscellaneous Packages
network permissions in class loader: 6.3.3. Network Permissions in the Class Loader
networking: 5.2.2. Permissions of the Java API
6.3.6. Establishing a Security Policy in 1.2
D.8. Miscellaneous Packages
packages: 6.3.5. Implementing Package Access
Permission class: 5.2. Permissions
D.1. Package java.security
guarded objects and: 5.6. Guarded Objects
how to use: 5.2.3. Using the Permission Class
permission collections: 5.2.5. Permission Collections
PermissionCollection class: 5.2.5. Permission Collections
D.1. Package java.security
Permissions class: 5.2.6. The Permissions Class
protection domains: 5.4. Protection Domains
5.4. Protection Domains
resolving external: 5.2.2. Permissions of the Java API
SecurityManager methods and: 6.3.6. Establishing a Security Policy in 1.2
serialization: 5.2.2. Permissions of the Java API
D.8. Miscellaneous Packages
sockets: 5.2.2. Permissions of the Java API
6.3.6. Establishing a Security Policy in 1.2
D.8. Miscellaneous Packages
specifying for code sources (see security policy)
threads: 6.3.4. Implementing Thread Security
windowing resources: 5.2.2. Permissions of the Java API
Permissions class: D.1. Package java.security
PKCS7 block files: 12.2.1. Reading Signed JAR Files
PKCS8EncodedKeySpec class: 10.3.3.1. The EncodedKeySpec class
D.4. Package java.security.spec
PKCS5Padding scheme: 13.5. Encrypting Data
Policy class: 5.3. The Policy Class
D.1. Package java.security
policy codebases
managing with policytool: A.3.1. Managing Policy Codebases
permissions: A.3.2. Managing Permissions
policy entries: 5.3.1. The Default Policy
PolicyFile class: 5.3. The Policy Class
policytool tool: A.3. The policytool
policy.url.# properties: 5.3.1. The Default Policy
ports in socket permission names: 5.2.2. Permissions of the Java API
primordial class loader: 3.2.1. The Internal Class Loader
Principal interface: D.1. Package java.security
principals: 11.1.1. Principals
Principle interface: 11.1.1. Principals
-printcert option (keystore): A.1.6. Examining Keystore Data
printing
certificates: A.1.6. Examining Keystore Data
permissions: 5.2.3. Using the Permission Class
printer access: 4.3.6. Methods Protecting System Resources
priority, thread: 2.1. Java Language Security Constructs
privacy, snooping: 7.1.2. Data Authentication
private access level: 2.1. Java Language Security Constructs
private cryptographic keys: 7.3.2. Cryptographic Keys
DHPrivateKeySpec class: 13.4.2.1. Secret key specifications
DSAPrivateKey interface: 10.1.1.1. DSA keys
D.3. Package java.security.interfaces
D.3. Package java.security.interfaces
DSAPrivateKeySpec class: 10.3.3.2. The AlgorithmParameterSpec interface
D.4. Package java.security.spec
encrypting: 11.3. A Key Management Example
generating: 10.2. The KeyPairGenerator Class
importing: 10.3.1. Using the KeyFactory class
JCE interfaces for: 13.3. Key Types in the JCE
D.6. Package javax.crypto.interfaces
PrivateKey interface: 10.1.1. The Key Interface
D.1. Package java.security
RSAPrivateKey interface: D.3. Package java.security.interfaces
RSAPrivateKeySpec class: 13.4.2.1. Secret key specifications
D.4. Package java.security.spec
signers: B.1.2. Signers
B.3.2. Implementing a Signer Class
D.1. Package java.security
symmetric key agreements: 13.7. Symmetric Key Agreement
private identity scopes: B.3.3. A Shared System Identity Scope
programs: 1.3. Applications, Applets, and Programs
bytecode verification: 1.3.1. Anatomy of a Java Application
2.2.2. The Bytecode Verifier
cancelling: 2.2.2.3. Controlling bytecode verification
delayed: 2.2.2.2. Delayed bytecode verification
element access levels: 2.1. Java Language Security Constructs
enforcing Java language rules: 2.2. Enforcement of the Java Language Rules
propagating cipher block chaining mode: 13.5. Encrypting Data
properties
access to: 4.3.6. Methods Protecting System Resources
permissions for: 5.2.2. Permissions of the Java API
D.8. Miscellaneous Packages
PropertyPermission class: 5.2.2. Permissions of the Java API
D.8. Miscellaneous Packages
substitution for: 5.3. The Policy Class
properties, provider: 8.2.2. Implementing the Provider Class
protected access level: 2.1. Java Language Security Constructs
protection domains: 5.4. Protection Domains
network permissions in: 6.3.3. Network Permissions in the Class Loader
ProtectionDomain class: 5.4. Protection Domains
D.1. Package java.security
protocols and class loaders: 3.5. Extensions to the Class Loader
Provider class: 8.1.1. Components of the Architecture
8.2. The Provider Class
D.1. Package java.security
providers (see security providers)
proxy services: 4.3.3. Methods Relating to Network Access
public access level: 2.1. Java Language Security Constructs
final variables and: 2.1. Java Language Security Constructs
public identity scope: B.3.3. A Shared System Identity Scope
public key encryption: 7.3.2. Cryptographic Keys
certificates (see certificates)
DHPublicKeySpec class: 13.4.2.1. Secret key specifications
D.7. Package javax.crypto.spec
DSAPublicKey interface: 10.1.1.1. DSA keys
D.3. Package java.security.interfaces
D.3. Package java.security.interfaces
DSAPublicKeySpec class: 10.3.3.2. The AlgorithmParameterSpec interface
D.4. Package java.security.spec
generated public keys: 10.2. The KeyPairGenerator Class
generating public keys: 10.3.2. Implementing a Key Factory
Identity class: B.1.1. The Identity Class
importing public keys: 10.3.1. Using the KeyFactory class
including key with signatures: 12.1.3. Signing and Certificates
JCE interfaces for public keys: 13.3. Key Types in the JCE
D.6. Package javax.crypto.interfaces
PublicKey class: D.1. Package java.security
PublicKey interface: 10.1.1. The Key Interface
RSAPublicKey interface: D.7. Package javax.crypto.spec
RSAPublicKeySpec class: 13.4.2.1. Secret key specifications
D.4. Package java.security.spec
symmetric key agreements: 13.7. Symmetric Key Agreement


Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Library Navigation Links

Copyright © 2001 O'Reilly & Associates, Inc. All Rights Reserved.

This HTML Help has been published using the chm2web software.