Security patterns in practice : designing secure architectures using software patterns /
Annotation
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Chichester, U.K. :
J. Wiley & Sons,
©2013.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover; Half Title page; Title page; Copyright page; Dedication; About the Author; About the Foreword Author; Foreword; Preface; Part I: Introduction; Chapter 1: Motivation and Objectives; 1.1 Why Do We Need Security Patterns?; 1.2 Some Basic Definitions; 1.3 The History of Security Patterns; 1.4 Industrial Use of Security Patterns; 1.5 Other Approaches to Building Secure Systems; Chapter 2: Patterns and Security Patterns; 2.1 What is a Security Pattern?; 2.2 The Nature of Security Patterns; 2.3 Pattern Descriptions and Catalogs; 2.4 The Anatomy of a Security Pattern; 2.5 Pattern Diagrams.
- 2.6 How Can We Classify Security Patterns?2.7 Pattern Mining; 2.8 Uses for Security Patterns; 2.9 How to Evaluate Security Patterns and their Effect on Security; 2.10 Threat Modeling and Misuse Patterns; 2.11 Fault Tolerance Patterns; Chapter 3: A Secure Systems Development Methodology; 3.1 Adding Information to Patterns; 3.2 A Lifecyle-Based Methodology; 3.3 Using Model-Driven Engineering; Part II: Patterns; Chapter 4: Patterns for Identity Management; 4.1 Introduction; 4.2 Circle of Trust; 4.3 Identity Provider; 4.4 Identity Federation; 4.5 Liberty Alliance Identity Federation.
- Chapter 5: Patterns for Authentication5.1 Introduction; 5.2 Authenticator; 5.3 Remote Authenticator/Authorizer; 5.4 Credential; Chapter 6: Patterns for Access Control; 6.1 Introduction; 6.2 Authorization; 6.3 Role-Based Access Control; 6.4 Multilevel Security; 6.5 Policy-Based Access Control; 6.6 Access Control List; 6.7 Capability; 6.8 Reified Reference Monitor; 6.9 Controlled Access Session; 6.10 Session-Based Role-Based Access Control; 6.11 Security Logger and Auditor; Chapter 7: Patterns for Secure Process Management; 7.1 Introduction; 7.2 Secure Process/Thread.
- 7.3 Controlled-Process Creator7.4 Controlled-Object Factory; 7.5 Controlled-Object Monitor; 7.6 Protected Entry Points; 7.7 Protection Rings; Chapter 8: Patterns for Secure Execution and File Management; 8.1 Introduction; 8.2 Virtual Address Space Access Control; 8.3 Execution Domain; 8.4 Controlled Execution Domain; 8.5 Virtual Address Space Structure Selection; Chapter 9: Patterns for Secure OS Architecture and Administration; 9.1 Introduction; 9.2 Modular Operating System Architecture; 9.3 Layered Operating System Architecture; 9.4 Microkernel Operating System Architecture.
- 9.5 Virtual Machine Operating System Architecture9.6 Administrator Hierarchy; 9.7 File Access Control; Chapter 10: Security Patterns for Networks; 10.1 Introduction; 10.2 Abstract Virtual Private Network; 10.3 IPSec VPN; 10.4 TLS Virtual Private Network; 10.5 Transport Layer Security; 10.6 Abstract IDS; 10.7 Signature-Based IDS; 10.8 Behavior-Based IDS; Chapter 11: Patterns for Web Services Security; 11.1 Introduction; 11.2 Application Firewall; 11.3 XML Firewall; 11.4 XACML Authorization; 11.5 XACML Access Control Evaluation; 11.6 Web Services Policy Language; 11.7 WS-Policy; 11.8 WS-Trust.