Index: C
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: C
- caching loaded classes: 3.4.1.1. Protected methods in the ClassLoader class
- cancelling bytecode verification: 2.2.2.3. Controlling bytecode verification
- CAs (certificate authorities): 10.4. Certificates
- A.1.3. Adding a Key Entry
- revoking certificates: 10.4.5. Revoked Certificates
- casting illegally: 2.1. Java Language Security Constructs
- 2.1. Java Language Security Constructs
- Java compiler and: 2.2.1. Compiler Enforcement
- virtual machine and: 2.1. Java Language Security Constructs
- 2.2.3. Runtime Enforcement
- catching security exceptions: 4.1.1. Security Managers and the Java API
- CBC encryption mode: 13.5. Encrypting Data
- certificate entries: 11.2. The KeyStore Class
- A.1. The keytool
- adding to database: A.1.2. Adding a Certificate Entry
- deleting: A.1.5. Deleting Keystore Entries
- examining: A.1.6. Examining Keystore Data
- managing with policytool: A.3.3. Managing Certificate Entries
- modifying: A.1.4. Modifying Keystore Entries
- passwords for: A.1.1. Global Options to keytool
- A.1.4. Modifying Keystore Entries
- certificates: 10. Keys and Certificates
- 10.4. Certificates
- CAs (certificate authorities): 10.4. Certificates
- 10.4.5. Revoked Certificates
- A.1.3. Adding a Key Entry
- Certificate class: 10.4. Certificates
- D.2. Package java.security.cert
- Certificate interface: 10.4. Certificates
- CSRs (certificate signing requests): A.1.3. Adding a Key Entry
- digital signatures and: 12.1.3. Signing and Certificates
- distinguished names (DNs): 11.1.1. Principals
- importing/exporting: A.1.6. Examining Keystore Data
- java.security.cert quick reference: D.2. Package java.security.cert
- printing: A.1.6. Examining Keystore Data
- revoked: 10.4.5. Revoked Certificates
- D.2. Package java.security.cert
- D.2. Package java.security.cert
- serialization and: 10.5. Keys, Certificates, and Object Serialization
- TBS certificates: 10.4.4. Advanced X509Certificate Methods
- 10.4.5. Revoked Certificates
- when necessary: 10.4. Certificates
- X509 certificates
- serialization and: 12.1.3. Signing and Certificates
- X509Certificate class: 10.4.3. The X509Certificate Class
- D.2. Package java.security.cert
- X509CRL class: 10.4.5. Revoked Certificates
- D.2. Package java.security.cert
- X509EncodedKeySpec class: 10.3.3.1. The EncodedKeySpec class
- D.4. Package java.security.spec
- X509Extension class: D.2. Package java.security.cert
- certificates( ), Identity class: B.1.1.1. Using the identity class
- CFB encryption mode: 13.5. Encrypting Data
- check, determining if in progress: 6.1.2. Protected Instance Variables in the Security Manager
- checkAccept( ), SecurityManager class: 4.3.3. Methods Relating to Network Access
- 6.3.2. Implementing Network Access
- checkAccess( ), RMISecurityManager class: 6.3.7.1. The RMI security manager
- checkAccess( ), SecurityManager class: 4.3.5. Methods Protecting Program Threads
- 6.1.1. The Class Loader Depth
- default security policy and: 6.3.6. Establishing a Security Policy in 1.2
- implementing thread security: 6.3.4. Implementing Thread Security
- checkAwtEventQueueAccess( ): 4.3.6. Methods Protecting System Resources
- 4.3.6. Methods Protecting System Resources
- checkClassDepth( ): 6.3.1. Utility Classes
- security manager methods with: 6.3.7.2. A complete 1.1 security manager
- checkClassLoader( ): 6.3.1. Utility Classes
- security manager methods with: 6.3.7.2. A complete 1.1 security manager
- checkConnect( ): 4.3.3. Methods Relating to Network Access
- connections to source host only: 6.3.2. Implementing Network Access
- customizing network security model: 6.3.2. Implementing Network Access
- inCheck variable and: 6.1.2. Protected Instance Variables in the Security Manager
- RMISecurityManager class: 6.3.7.1. The RMI security manager
- checkCreateClassLoader( ): 4.3.4. Methods Protecting the Java Virtual Machine
- 6.1.1. The Class Loader Depth
- checkDelete( ): 4.3.2. Methods Relating to File Access
- 6.1.1. The Class Loader Depth
- checkExec( ): 4.3.4. Methods Protecting the Java Virtual Machine
- 6.1.1. The Class Loader Depth
- default security policy and: 6.3.6. Establishing a Security Policy in 1.2
- checkExit( ): 4.3.4. Methods Protecting the Java Virtual Machine
- 6.1.1. The Class Loader Depth
- checkGuard( ): 5.2.3. Using the Permission Class
- 5.6. Guarded Objects
- checkLink( ): 4.3.4. Methods Protecting the Java Virtual Machine
- 6.1.1. The Class Loader Depth
- checkListen( ): 4.3.3. Methods Relating to Network Access
- checkMemberAccess( ): 4.3.7. Methods Protecting Security Aspects
- 6.1.1. The Class Loader Depth
- default security policy and: 6.3.6. Establishing a Security Policy in 1.2
- RMISecurityManager class: 6.3.7.1. The RMI security manager
- checkMulticast( ), SecurityManager class: 4.3.3. Methods Relating to Network Access
- checkPackageAccess( ): 3.4.3. Implementing Security Policies in the Class Loader
- 4.3.7. Methods Protecting Security Aspects
- 6.2.1. The Class Loader and the Security Manager
- 6.3.5. Implementing Package Access
- RMISecurityManager class: 6.3.7.1. The RMI security manager
- checkPackageDefinition( ): 4.3.7. Methods Protecting Security Aspects
- 6.2.1. The Class Loader and the Security Manager
- RMISecurityManager class: 6.3.7.1. The RMI security manager
- checkPermission( )
- AccessController class: 5.5. The AccessController Class
- SecurityManager class: 4.3.4. Methods Protecting the Java Virtual Machine
- checkPrintJobAccess( ), SecurityManager class: 4.3.6. Methods Protecting System Resources
- checkPropertiesAccess( ): 4.3.6. Methods Protecting System Resources
- checkPropertiesAccess( ), SecurityManager class: 4.3.6. Methods Protecting System Resources
- checkProperty( ): 5.3. The Policy Class
- checkPropertyAccess( ): 4.3.6. Methods Protecting System Resources
- 6.1.1. The Class Loader Depth
- RMISecurityManager class: 6.3.7.1. The RMI security manager
- checkPropertyAccess( ), SecurityManager class: 4.3.6. Methods Protecting System Resources
- checkRead( ): 4.3.2. Methods Relating to File Access
- 6.1.1. The Class Loader Depth
- RMISecurityManager class: 6.3.7.1. The RMI security manager
- security policy for: 6.3.7.3. Implementing the file access methods
- checkSecurityAccess( ): 4.3.7. Methods Protecting Security Aspects
- 8.2.1. Using the Provider Class
- 8.3.1. The Security Class and the Security Manager
- B.1.1.3. The Identity class and the security manager
- B.1.2.3. Signers and the security manager
- SecurityManager class: B.2.3. IdentityScope and the Security Manager
- checkSetFactory( )
- RMISecurityManager class: 6.3.7.1. The RMI security manager
- SecurityManager class: 4.3.3. Methods Relating to Network Access
- 4.3.3. Methods Relating to Network Access
- checkSystemClipboardAccess( ): 4.3.6. Methods Protecting System Resources
- checkTopLevelWindow( ): 4.3.6. Methods Protecting System Resources
- 4.3.6. Methods Protecting System Resources
- 6.1.1. The Class Loader Depth
- 6.3.7.5. Implementing miscellaneous methods
- default security policy and: 6.3.6. Establishing a Security Policy in 1.2
- RMISecurityManager class: 6.3.7.1. The RMI security manager
- checkWrite( ): 4.3.2. Methods Relating to File Access
- 6.1.1. The Class Loader Depth
- RMISecurityManager class: 6.3.7.1. The RMI security manager
- security policy for: 6.3.7.3. Implementing the file access methods
- cipher algorithms: 13.5.2. Cipher Algorithms
- cipher block chaining encryption mode: 13.5. Encrypting Data
- Cipher class: 13.2. The Sun Security Provider in the JCE
- 13.5. Encrypting Data
- D.5. Package javax.crypto
- implementing: 13.5.3. Implementing the Cipher Class
- D.5. Package javax.crypto
- NullCipher class: 13.5.1. Using the Cipher Class
- D.5. Package javax.crypto
- cipher-feedback encryption mode: 13.5. Encrypting Data
- cipher streams: 13.6. Cipher Streams
- D.5. Package javax.crypto
- CipherInputStream class: 13.6.2. The CipherInputStream Class
- D.5. Package javax.crypto
- CipherOutputStream class: 13.6.1. The CipherOutputStream Class
- D.5. Package javax.crypto
- CipherSpi class: 13.5.3. Implementing the Cipher Class
- D.5. Package javax.crypto
- class loaders: 1.3.1. Anatomy of a Java Application
- 3. Java Class Loaders
- asking information of/for security managers: 6.2. Security Managers and the Class Loader
- caching loaded classes: 3.4.1.1. Protected methods in the ClassLoader class
- choosing: 3.2.6. Choosing the Right Class Loader
- ClassLoader class: D.8. Miscellaneous Packages
- CLASSPATH variable and: 1.4.2. Built-in Java Application Security
- connections to source host only: 6.3.2. Implementing Network Access
- delegation model for: 3.6.1. Delegation
- depth of: 6.1.1. The Class Loader Depth
- extensions to: 3.5. Extensions to the Class Loader
- how classes are loaded: 3.2. Anatomy of a Class Loader
- 3.3. Loading Classes
- implementing: 3.4. Implementing a Class Loader
- implementing security policies: 3.4.3. Implementing Security Policies in the Class Loader
- for JAR files: 3.5.2. A JAR File Class Loader
- loading resources with: 3.6.2. Loading Resources
- of most recently called class: 6.1. Protected Methods of the Security Manager
- namespaces and: 3.1.2. Class Loaders and Namespaces
- network permissions in: 6.3.3. Network Permissions in the Class Loader
- protection domains and: 5.4. Protection Domains
- protocols and: 3.5. Extensions to the Class Loader
- RMIClassLoader class: 3.2.3. The RMI Class Loader
- 3.2.6. Choosing the Right Class Loader
- D.8. Miscellaneous Packages
- security enforcement: 3.1.1. Class Loaders and Security Enforcement
- security manager and: 3.1.1. Class Loaders and Security Enforcement
- 3.2. Anatomy of a Class Loader
- 6.1. Protected Methods of the Security Manager
- types of: 3.2.1. The Internal Class Loader
- URLClassLoader class: D.8. Miscellaneous Packages
- ClassCastException: 2.1. Java Language Security Constructs
- classDepth( ): 6.1. Protected Methods of the Security Manager
- classes
- access to members of: 4.3.7. Methods Protecting Security Aspects
- for algorithms: 8.1.1. Components of the Architecture
- authenticating (see authentication)
- class loader depth: 6.1.1. The Class Loader Depth
- defining: 3.4.3. Implementing Security Policies in the Class Loader
- 6.2.1. The Class Loader and the Security Manager
- different class loaders and: 3.1.2. Class Loaders and Namespaces
- engine classes: 8.1.1. Components of the Architecture
- architecture of: 8.4. The Architecture of Engine Classes
- for message digests, creating: 9.3. Implementing a MessageDigest Class
- involved in calling security manager: 6.1. Protected Methods of the Security Manager
- loading: 3.2. Anatomy of a Class Loader
- 3.3. Loading Classes
- 3.3. Loading Classes
- 6.2.1. The Class Loader and the Security Manager
- caching loaded classes: 3.4.1.1. Protected methods in the ClassLoader class
- delegation model for: 3.6.1. Delegation
- from JAR files: 3.5.2. A JAR File Class Loader
- from multiple sites: 3.5.1. Loading from Multiple Sites
- from URLs: 3.2.5. The URL Class Loader
- not verifying: 2.2.2.3. Controlling bytecode verification
- protection domains and: 5.4. Protection Domains
- resolving: 3.2. Anatomy of a Class Loader
- 3.4.1.1. Protected methods in the ClassLoader class
- of the same package: 3.1.2. Class Loaders and Namespaces
- sealed classes: 13.8. Sealed Objects
- D.5. Package javax.crypto
- SecureClassLoader class: 3.2.4. The Secure Class Loader
- D.1. Package java.security
- SPI classes: 8.4. The Architecture of Engine Classes
- trusted vs. untrusted: 4.2. Trusted and Untrusted Classes
- 6.1. Protected Methods of the Security Manager
- classes, signed: 12.2. Signed Classes
- ClassLoader class: 3.4.1. Implementing the ClassLoader Class
- caching loaded classes: 3.4.1.1. Protected methods in the ClassLoader class
- delegation model for: 3.6.1. Delegation
- classLoaderDepth( ): 6.1.1. The Class Loader Depth
- CLASSPATH environment variable: 1.4.2. Built-in Java Application Security
- 4.2. Trusted and Untrusted Classes
- client sockets: 4.3.3. Methods Relating to Network Access
- clipboard, access to: 4.3.6. Methods Protecting System Resources
- CN (common name): 11.1.1. Principals
- code sources: 5.1. The CodeSource Class
- permissions for (see security policy)
- protection domains: 5.4. Protection Domains
- 5.4. Protection Domains
- CODEBASE attribute: 3.1.2. Class Loaders and Namespaces
- 3.5.1. Loading from Multiple Sites
- codeBase entry (policy file): 5.3.1. The Default Policy
- codebases
- managing with policytool: A.3.1. Managing Policy Codebases
- permissions for: A.3.2. Managing Permissions
- CodeSource( ): 5.1. The CodeSource Class
- CodeSource class: 5.1. The CodeSource Class
- D.1. Package java.security
- collections of permissions: 5.2.5. Permission Collections
- com.sun.crypto.provider.SunJCE class: 13.2. The Sun Security Provider in the JCE
- cipher algorithms: 13.5.2. Cipher Algorithms
- encryption modes: 13.5. Encrypting Data
- key agreement algorithm: 13.7. Symmetric Key Agreement
- padding schemes: 13.5. Encrypting Data
- commercial software: 7.1. The Need for Authentication
- C.2. Third-Party Security Providers
- common name (CN): 11.1.1. Principals
- compiler
- enforcing Java language rules: 2.2.1. Compiler Enforcement
- writing illegal code: 2.2.2. The Bytecode Verifier
- constants (final variables): 2.1. Java Language Security Constructs
- 2.2.2. The Bytecode Verifier
- containsAlias( ), KeyStore class: 11.2. The KeyStore Class
- CRLs (certificate revocation lists): 10.4.5. Revoked Certificates
- cryptographic keys: 7.3.2. Cryptographic Keys
- public/private key pairs: 7.3.2. Cryptographic Keys
- secret keys: 7.3.2. Cryptographic Keys
- cryptography
- authentication, role of: 7.2. The Role of Authentication
- authentication vs. encryption: 7.1.2. Data Authentication
- certificates (see certificates)
- encryption export restrictions: 13.1. Export Restrictions
- encryption strength: 10.2.1. Using the KeyPairGenerator Class
- 11.3. A Key Management Example
- engines for: 7.3. Cryptographic Engines
- JCE (see JCE)
- keys for (see keys, cryptographic)
- reasons for: 7.1. The Need for Authentication
- -csr option (keystore): A.1.3. Adding a Key Entry
- CSRs (certificate signing requests): A.1.3. Adding a Key Entry
- currentClassLoader( ): 6.1. Protected Methods of the Security Manager
- currentLoadedClass( ): 6.1. Protected Methods of the Security Manager
- custom class loaders: 3.2.6. Choosing the Right Class Loader
- customizing
- network security model: 6.3.2. Implementing Network Access
- security managers: 6. Implementing Security Policies
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2001
O'Reilly & Associates, Inc.
All Rights Reserved.