Book Home

Java Security Search this book

Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: S

sandboxes
description of sandbox model: 1.2. The Java Sandbox
signed classes and: 12.2. Signed Classes
specifying as application argument: 1.4.2. Built-in Java Application Security
sealed classes: 13.8. Sealed Objects
D.5. Package javax.crypto
SealedObject class: 13.8. Sealed Objects
D.5. Package javax.crypto
secret keys: 7.3.2. Cryptographic Keys
13.3.1. Secret Keys
engines for: 13.4. Secret Key Engines
KeyGenerator class: 13.2. The Sun Security Provider in the JCE
13.4.1. The KeyGenerator Class
D.5. Package javax.crypto
KeyGeneratorSpi class: D.5. Package javax.crypto
SecretKey class: D.5. Package javax.crypto
SecretKeyFactory class: 13.2. The Sun Security Provider in the JCE
13.2. The Sun Security Provider in the JCE
13.4.2. The SecretKeyFactory Class
D.5. Package javax.crypto
SecretKeyFactorySpi class: 13.4.2.2. The secret key factory SPI
D.5. Package javax.crypto
secure message digests: 9.1.1. Secure Message Digests
Secure Socket Layer (SSL): 7.1.3. Java's Role in Authentication
13.6.3. SSL Encryption
SecureClassLoader class: 3.2.4. The Secure Class Loader
5.1. The CodeSource Class
D.1. Package java.security
implementing: 3.4.2. Implementing the SecureClassLoader Class
SecureRandom class: D.1. Package java.security
security
aspects of, protecting: 4.3.7. Methods Protecting Security Aspects
bugs: C.1. Security Bugs
built into applications: 1.4.2. Built-in Java Application Security
class loaders and: 3.1. Security and the Class Loader
cryptography (see cryptography)
definition of: 1.1. What Is Security?
encryption exportation laws: 13.1. Export Restrictions
enforcing Java language rules: 2.2. Enforcement of the Java Language Rules
engines for (see engines, security)
file access: 4.3.2. Methods Relating to File Access
jarsigner tool: A.2. The jarsigner Tool
Java language constructs for: 2.1. Java Language Security Constructs
java.policy files, administering by hand: A.4.2. The java.policy File
java.security file: 5.3.1. The Default Policy
administering by hand: A.4.1. The java.security File
code of (Java 1.2): 5.3.1. The Default Policy
keys (see key, cryptographic)
keytool utility: A.1. The keytool
object serialization and: 2.1.1. Object Serialization and Memory Integrity
operating system and: 1.4. Running a Java Application
policytool tool: A.3. The policytool
protection domains: 5.4. Protection Domains
resources for further reading: C. Security Resources
threats to (see threats)
Security class: 8.1.1. Components of the Architecture
8.3. The Security Class
D.1. Package java.security
security manager and: 8.3.1. The Security Class and the Security Manager
security exceptions: 4.1.1. Security Managers and the Java API
4.1.1. Security Managers and the Java API
security managers: 1.3.1. Anatomy of a Java Application
4.1. Overview of the Security Manager
access controller and: 5. The Access Controller
6.3.6. Establishing a Security Policy in 1.2
asking information of/for class loader: 6.2. Security Managers and the Class Loader
class loaders and: 3.1.1. Class Loaders and Security Enforcement
3.2. Anatomy of a Class Loader
custom, when to write: 6. Implementing Security Policies
file-access methods: 4.3.2. Methods Relating to File Access
Identity class and: B.1.1.3. The Identity class and the security manager
identity scopes and: B.2.3. IdentityScope and the Security Manager
Java API and: 4.1.1. Security Managers and the Java API
JavaRunner program with (example): 6.4.1. The Secure JavaRunner Program
network-access methods: 4.3.3. Methods Relating to Network Access
null: 6.3.7.2. A complete 1.1 security manager
protected instance variables: 6.1.2. Protected Instance Variables in the Security Manager
protected methods of: 6.1. Protected Methods of the Security Manager
protecting JVM: 4.3.4. Methods Protecting the Java Virtual Machine
protecting security aspects: 4.3.7. Methods Protecting Security Aspects
protecting system resources: 4.3.6. Methods Protecting System Resources
protecting threads: 4.3.5. Methods Protecting Program Threads
for RMI server: 6.3.7.1. The RMI security manager
RMISecurityManager class: 6.3.7.1. The RMI security manager
D.8. Miscellaneous Packages
Security class and: 8.3.1. The Security Class and the Security Manager
setting: 4.3.1. Setting a Security Manager
signed JAR files and: 12.2.2. The Signed JAR File and Security Policies
signers and: B.1.2.3. Signers and the security manager
testing: 6.1.1. The Class Loader Depth
trusted vs. untrusted classes: 4.2. Trusted and Untrusted Classes
security package (java.security): 1.3.1. Anatomy of a Java Application
permissions to use: 5.2.2. Permissions of the Java API
quick reference: D.1. Package java.security
security providers and: 8.1.1. Components of the Architecture
security policy: 5.3. The Policy Class
default: 5.3.1. The Default Policy
6.3.6. Establishing a Security Policy in 1.2
for file acces methods: 6.3.7.3. Implementing the file access methods
implementing from threads: 6.3.4. Implementing Thread Security
implementing in class loader: 3.4.3. Implementing Security Policies in the Class Loader
implementing network access: 6.3.2. Implementing Network Access
in Java 1.2: 6.3.6. Establishing a Security Policy in 1.2
JavaRunner program and (example): 6.4.1. The Secure JavaRunner Program
Launcher application and (example): 6.4.2. The Secure Java Launcher
for networks, threads, packages: 6.3.7.4. Implementing network, thread, and package access
operating system and: 1.4. Running a Java Application
package access: 6.3.5. Implementing Package Access
Policy class: D.1. Package java.security
policy entries: 5.3.1. The Default Policy
PolicyFile class: 5.3. The Policy Class
reading from URLs: 5.3.1. The Default Policy
setting the security manager: 4.3.1. Setting a Security Manager
signed JAR files: 12.2.2. The Signed JAR File and Security Policies
utility classes for implementing: 6.3.1. Utility Classes
security providers: 8. Security Providers
adding: 8.1.2. Choosing a Security Provider
8.3. The Security Class
architecture of: 8.1. The Architecture of Security Providers
interface for (SPI): 8.4. The Architecture of Engine Classes
java.security and: 8.1.1. Components of the Architecture
for keystore objects: 11.3. A Key Management Example
listing for virtual machine: 8.3. The Security Class
properties (associations) for: 8.2.2. Implementing the Provider Class
Provider class: 8.1.1. Components of the Architecture
8.2. The Provider Class
D.1. Package java.security
Sun JCE: 13.2. The Sun Security Provider in the JCE
third-party, list of: C.2. Third-Party Security Providers
translate keys between: 10.3.1. Using the KeyFactory class
SecurityException class: 4.1.1. Security Managers and the Java API
4.1.1. Security Managers and the Java API
SecurityManager class: 4.1.1. Security Managers and the Java API
6.3.6. Establishing a Security Policy in 1.2
D.8. Miscellaneous Packages
implementing in Java 1.2: 6.3.6. Establishing a Security Policy in 1.2
RMISecurityManager class: 6.3.7.1. The RMI security manager
D.8. Miscellaneous Packages
SecurityPermission class: 5.2.2. Permissions of the Java API
D.1. Package java.security
-selfcert option (keystore): A.1.4. Modifying Keystore Entries
Serializable interface: 2.1.1. Object Serialization and Memory Integrity
serialization: 2.1.1. Object Serialization and Memory Integrity
10.5. Keys, Certificates, and Object Serialization
permissions for: 5.2.2. Permissions of the Java API
D.8. Miscellaneous Packages
SerializablePermission class: 5.2.2. Permissions of the Java API
D.8. Miscellaneous Packages
X509 certificates and: 12.1.3. Signing and Certificates
server sockets: 4.3.3. Methods Relating to Network Access
setCertificateEntry( ), KeyStore class: 11.2. The KeyStore Class
setInfo( ), Identity class: B.1.1.1. Using the identity class
B.1.1.3. The Identity class and the security manager
setKeyPair( ), Signer class: B.1.2.1. Using the Signer class
setParameter( ), Signature class: 12.1.1. Using the Signature Class
setPolicy( ), Policy class: 5.3. The Policy Class
setPriority( ), Thread class: 2.1. Java Language Security Constructs
setPublicKey( ), Identity class: B.1.1.1. Using the identity class
B.1.1.3. The Identity class and the security manager
setSecurityManager( ), SecurityManager class: 4.3.1. Setting a Security Manager
setSystemScope( ), IdentityScope class: B.2.3. IdentityScope and the Security Manager
setting the security manager: 4.3.1. Setting a Security Manager
.SF filename extension: 12.2.1. Reading Signed JAR Files
shared identity scope: B.3.3. A Shared System Identity Scope
sharing keystores: 11.3. A Key Management Example
-sigalg option (keytool): A.1.3. Adding a Key Entry
A.1.3. Adding a Key Entry
-sigfile option (jarsigner): A.2.1. Creating a Signed JAR File
sign( ), Signature class: 12.1.1. Using the Signature Class
12.1.1. Using the Signature Class
Signature class: 12.1. The Signature Class
D.1. Package java.security
implementing: 12.3. Implementing a Signature Class
MessageDigest class vs.: 12.1.1. Using the Signature Class
signature files: 12.2.1. Reading Signed JAR Files
signatures (see digital signatures)
SignatureSpi class: D.1. Package java.security
signed classes: 12.2. Signed Classes
signed JAR files
reading: 12.2.1. Reading Signed JAR Files
security policy and: 12.2.2. The Signed JAR File and Security Policies
signedBy entry (policy file): 5.3.1. The Default Policy
-signedjar option (jarsigner): A.2.1. Creating a Signed JAR File
SignedObject class: 12.1.2. The SignedObject Class
D.1. Package java.security
Signer class: B.1.2. Signers
B.3.2. Implementing a Signer Class
D.1. Package java.security
signer entry (policy file): 5.3.1. The Default Policy
SIGNER.DSA file: A.2. The jarsigner Tool
SIGNER.SF file: A.2. The jarsigner Tool
signing JAR files: A.2.1. Creating a Signed JAR File
size( )
IdentityScope class: B.2.1. Using the IdentityScope Class
KeyStore class: 11.2. The KeyStore Class
snooping: 7.1.2. Data Authentication
socket factories: 4.3.3. Methods Relating to Network Access
4.3.3. Methods Relating to Network Access
sockets: 4.3.3. Methods Relating to Network Access
multicast, permissions for: 5.2.2. Permissions of the Java API
6.3.6. Establishing a Security Policy in 1.2
D.8. Miscellaneous Packages
permissions for: 5.2.2. Permissions of the Java API
6.3.6. Establishing a Security Policy in 1.2
D.8. Miscellaneous Packages
SocketPermission class: 5.2.2. Permissions of the Java API
6.3.6. Establishing a Security Policy in 1.2
D.8. Miscellaneous Packages
software, commercial: 7.1. The Need for Authentication
C.2. Third-Party Security Providers
SPI (security provider interface): 8.4. The Architecture of Engine Classes
spoofing: 7.1.1. Author Authentication
C.1.1. Java Security Bugs
SSL encryption: 7.1.3. Java's Role in Authentication
13.6.3. SSL Encryption
SSLSocket class: 13.6.3. SSL Encryption
stack trace of threads: 5.5. The AccessController Class
state, object: 2.1.1. Object Serialization and Memory Integrity
store( ), KeyStore class: 11.2. The KeyStore Class
-storepass option (jarsigner): A.2.1. Creating a Signed JAR File
-storepass option (keytool): A.1.1. Global Options to keytool
-storepassword option (keystore): A.1.8. Miscellaneous Commands
streams
cipher streams: 13.6. Cipher Streams
D.5. Package javax.crypto
digest streams: D.1. Package java.security
message digest: 9.2. Message Digest Streams
strength, encryption: 10.2.1. Using the KeyPairGenerator Class
11.3. A Key Management Example
StrictSecurityManager class (example): 6.3.7.2. A complete 1.1 security manager
Sun JCE security provider: 13.2. The Sun Security Provider in the JCE
cipher algorithms: 13.5.2. Cipher Algorithms
encryption modes: 13.5. Encrypting Data
key agreement algorithm: 13.7. Symmetric Key Agreement
padding schemes: 13.5. Encrypting Data
sun.security.X509.X509CertImpl class: 12.1.3. Signing and Certificates
SunJCE class: 13.2. The Sun Security Provider in the JCE
cipher algorithms: 13.5.2. Cipher Algorithms
encryption modes: 13.5. Encrypting Data
key agreement algorithm: 13.7. Symmetric Key Agreement
padding schemes: 13.5. Encrypting Data
sun.misc.Launcher class: 1.4.2. Built-in Java Application Security
symmetric key agreements: 13.7. Symmetric Key Agreement
system resources protecting with security managers: 4.3.6. Methods Protecting System Resources


Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Library Navigation Links

Copyright © 2001 O'Reilly & Associates, Inc. All Rights Reserved.

This HTML Help has been published using the chm2web software.