Index: C
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: C
- caching loaded classes: 3.4.1.1. Protected methods in the ClassLoader class
 
- cancelling bytecode verification: 2.2.2.3. Controlling bytecode verification
 
- CAs (certificate authorities): 10.4. Certificates
 
  - A.1.3. Adding a Key Entry
 
  
  - revoking certificates: 10.4.5. Revoked Certificates
 
 
- casting illegally: 2.1. Java Language Security Constructs
 
  - 2.1. Java Language Security Constructs
 
  
  - Java compiler and: 2.2.1. Compiler Enforcement
 
  
  - virtual machine and: 2.1. Java Language Security Constructs
 
    - 2.2.3. Runtime Enforcement
 
  
 
 
- catching security exceptions: 4.1.1. Security Managers and the Java API
 
- CBC encryption mode: 13.5. Encrypting Data
 
- certificate entries: 11.2. The KeyStore Class
 
  - A.1. The keytool
 
  
  - adding to database: A.1.2. Adding a Certificate Entry
 
  
  - deleting: A.1.5. Deleting Keystore Entries
 
  
  - examining: A.1.6. Examining Keystore Data
 
  
  - managing with policytool: A.3.3. Managing Certificate Entries
 
  
  - modifying: A.1.4. Modifying Keystore Entries
 
  
  - passwords for: A.1.1. Global Options to keytool
 
    - A.1.4. Modifying Keystore Entries
 
  
 
 
- certificates: 10. Keys and Certificates
 
  - 10.4. Certificates
 
  
  - CAs (certificate authorities): 10.4. Certificates
 
    - 10.4.5. Revoked Certificates
 
    - A.1.3. Adding a Key Entry
 
  
 
  
  - Certificate class: 10.4. Certificates
 
    - D.2. Package java.security.cert
 
  
 
  
  - Certificate interface: 10.4. Certificates
 
  
  - CSRs (certificate signing requests): A.1.3. Adding a Key Entry
 
  
  - digital signatures and: 12.1.3. Signing and Certificates
 
  
  - distinguished names (DNs): 11.1.1. Principals
 
  
  - importing/exporting: A.1.6. Examining Keystore Data
 
  
  - java.security.cert quick reference: D.2. Package java.security.cert
 
  
  - printing: A.1.6. Examining Keystore Data
 
  
  - revoked: 10.4.5. Revoked Certificates
 
    - D.2. Package java.security.cert
 
    - D.2. Package java.security.cert
 
  
 
  
  - serialization and: 10.5. Keys, Certificates, and Object Serialization
 
  
  - TBS certificates: 10.4.4. Advanced X509Certificate Methods
 
    - 10.4.5. Revoked Certificates
 
  
 
  
  - when necessary: 10.4. Certificates
 
  
  - X509 certificates
 
    
    - serialization and: 12.1.3. Signing and Certificates
 
    
    - X509Certificate class: 10.4.3. The X509Certificate Class
 
      - D.2. Package java.security.cert
 
    
 
    
    - X509CRL class: 10.4.5. Revoked Certificates
 
      - D.2. Package java.security.cert
 
    
 
    
    - X509EncodedKeySpec class: 10.3.3.1. The EncodedKeySpec class
 
      - D.4. Package java.security.spec
 
    
 
    
    - X509Extension class: D.2. Package java.security.cert
 
  
 
 
- certificates( ), Identity class: B.1.1.1. Using the identity class
 
- CFB encryption mode: 13.5. Encrypting Data
 
- check, determining if in progress: 6.1.2. Protected Instance Variables in the Security Manager
 
- checkAccept( ), SecurityManager class: 4.3.3. Methods Relating to Network Access
 
  - 6.3.2. Implementing Network Access
 
 
- checkAccess( ), RMISecurityManager class: 6.3.7.1. The RMI security manager
 
- checkAccess( ), SecurityManager class: 4.3.5. Methods Protecting Program Threads
 
  - 6.1.1. The Class Loader Depth
 
  
  - default security policy and: 6.3.6. Establishing a Security Policy in 1.2
 
  
  - implementing thread security: 6.3.4. Implementing Thread Security
 
 
- checkAwtEventQueueAccess( ): 4.3.6. Methods Protecting System Resources
 
  - 4.3.6. Methods Protecting System Resources
 
 
- checkClassDepth( ): 6.3.1. Utility Classes
 
  
  - security manager methods with: 6.3.7.2. A complete 1.1 security manager
 
 
- checkClassLoader( ): 6.3.1. Utility Classes
 
  
  - security manager methods with: 6.3.7.2. A complete 1.1 security manager
 
 
- checkConnect( ): 4.3.3. Methods Relating to Network Access
 
  
  - connections to source host only: 6.3.2. Implementing Network Access
 
  
  - customizing network security model: 6.3.2. Implementing Network Access
 
  
  - inCheck variable and: 6.1.2. Protected Instance Variables in the Security Manager
 
  
  - RMISecurityManager class: 6.3.7.1. The RMI security manager
 
 
- checkCreateClassLoader( ): 4.3.4. Methods Protecting the Java Virtual Machine
 
  - 6.1.1. The Class Loader Depth
 
 
- checkDelete( ): 4.3.2. Methods Relating to File Access
 
  - 6.1.1. The Class Loader Depth
 
 
- checkExec( ): 4.3.4. Methods Protecting the Java Virtual Machine
 
  - 6.1.1. The Class Loader Depth
 
  
  - default security policy and: 6.3.6. Establishing a Security Policy in 1.2
 
 
- checkExit( ): 4.3.4. Methods Protecting the Java Virtual Machine
 
  - 6.1.1. The Class Loader Depth
 
 
- checkGuard( ): 5.2.3. Using the Permission Class
 
  - 5.6. Guarded Objects
 
 
- checkLink( ): 4.3.4. Methods Protecting the Java Virtual Machine
 
  - 6.1.1. The Class Loader Depth
 
 
- checkListen( ): 4.3.3. Methods Relating to Network Access
 
- checkMemberAccess( ): 4.3.7. Methods Protecting Security Aspects
 
  - 6.1.1. The Class Loader Depth
 
  
  - default security policy and: 6.3.6. Establishing a Security Policy in 1.2
 
  
  - RMISecurityManager class: 6.3.7.1. The RMI security manager
 
 
- checkMulticast( ), SecurityManager class: 4.3.3. Methods Relating to Network Access
 
- checkPackageAccess( ): 3.4.3. Implementing Security Policies in the Class Loader
 
  - 4.3.7. Methods Protecting Security Aspects
 
  - 6.2.1. The Class Loader and the Security Manager
 
  - 6.3.5. Implementing Package Access
 
  
  - RMISecurityManager class: 6.3.7.1. The RMI security manager
 
 
- checkPackageDefinition( ): 4.3.7. Methods Protecting Security Aspects
 
  - 6.2.1. The Class Loader and the Security Manager
 
  
  - RMISecurityManager class: 6.3.7.1. The RMI security manager
 
 
- checkPermission( )
 
  
  - AccessController class: 5.5. The AccessController Class
 
  
  - SecurityManager class: 4.3.4. Methods Protecting the Java Virtual Machine
 
 
- checkPrintJobAccess( ), SecurityManager class: 4.3.6. Methods Protecting System Resources
 
- checkPropertiesAccess( ): 4.3.6. Methods Protecting System Resources
 
- checkPropertiesAccess( ), SecurityManager class: 4.3.6. Methods Protecting System Resources
 
- checkProperty( ): 5.3. The Policy Class
 
- checkPropertyAccess( ): 4.3.6. Methods Protecting System Resources
 
  - 6.1.1. The Class Loader Depth
 
  
  - RMISecurityManager class: 6.3.7.1. The RMI security manager
 
 
- checkPropertyAccess( ), SecurityManager class: 4.3.6. Methods Protecting System Resources
 
- checkRead( ): 4.3.2. Methods Relating to File Access
 
  - 6.1.1. The Class Loader Depth
 
  
  - RMISecurityManager class: 6.3.7.1. The RMI security manager
 
  
  - security policy for: 6.3.7.3. Implementing the file access methods
 
 
- checkSecurityAccess( ): 4.3.7. Methods Protecting Security Aspects
 
  - 8.2.1. Using the Provider Class
 
  - 8.3.1. The Security Class and the Security Manager
 
  - B.1.1.3. The Identity class and the security manager
 
  - B.1.2.3. Signers and the security manager
 
  
  - SecurityManager class: B.2.3. IdentityScope and the Security Manager
 
 
- checkSetFactory( )
 
  
  - RMISecurityManager class: 6.3.7.1. The RMI security manager
 
  
  - SecurityManager class: 4.3.3. Methods Relating to Network Access
 
    - 4.3.3. Methods Relating to Network Access
 
  
 
 
- checkSystemClipboardAccess( ): 4.3.6. Methods Protecting System Resources
 
- checkTopLevelWindow( ): 4.3.6. Methods Protecting System Resources
 
  - 4.3.6. Methods Protecting System Resources
 
  - 6.1.1. The Class Loader Depth
 
  - 6.3.7.5. Implementing miscellaneous methods
 
  
  - default security policy and: 6.3.6. Establishing a Security Policy in 1.2
 
  
  - RMISecurityManager class: 6.3.7.1. The RMI security manager
 
 
- checkWrite( ): 4.3.2. Methods Relating to File Access
 
  - 6.1.1. The Class Loader Depth
 
  
  - RMISecurityManager class: 6.3.7.1. The RMI security manager
 
  
  - security policy for: 6.3.7.3. Implementing the file access methods
 
 
- cipher algorithms: 13.5.2. Cipher Algorithms
 
- cipher block chaining encryption mode: 13.5. Encrypting Data
 
- Cipher class: 13.2. The Sun Security Provider in the JCE
 
  - 13.5. Encrypting Data
 
  - D.5. Package javax.crypto
 
  
  - implementing: 13.5.3. Implementing the Cipher Class
 
    - D.5. Package javax.crypto
 
  
 
  
  - NullCipher class: 13.5.1. Using the Cipher Class
 
    - D.5. Package javax.crypto
 
  
 
 
- cipher-feedback encryption mode: 13.5. Encrypting Data
 
- cipher streams: 13.6. Cipher Streams
 
  - D.5. Package javax.crypto
 
 
- CipherInputStream class: 13.6.2. The CipherInputStream Class
 
  - D.5. Package javax.crypto
 
 
- CipherOutputStream class: 13.6.1. The CipherOutputStream Class
 
  - D.5. Package javax.crypto
 
 
- CipherSpi class: 13.5.3. Implementing the Cipher Class
 
  - D.5. Package javax.crypto
 
 
- class loaders: 1.3.1. Anatomy of a Java Application
 
  - 3. Java Class Loaders
 
  
  - asking information of/for security managers: 6.2. Security Managers and the Class Loader
 
  
  - caching loaded classes: 3.4.1.1. Protected methods in the ClassLoader class
 
  
  - choosing: 3.2.6. Choosing the Right Class Loader
 
  
  - ClassLoader class: D.8. Miscellaneous Packages
 
  
  - CLASSPATH variable and: 1.4.2. Built-in Java Application Security
 
  
  - connections to source host only: 6.3.2. Implementing Network Access
 
  
  - delegation model for: 3.6.1. Delegation
 
  
  - depth of: 6.1.1. The Class Loader Depth
 
  
  - extensions to: 3.5. Extensions to the Class Loader
 
  
  - how classes are loaded: 3.2. Anatomy of a Class Loader
 
    - 3.3. Loading Classes
 
  
 
  
  - implementing: 3.4. Implementing a Class Loader
 
  
  - implementing security policies: 3.4.3. Implementing Security Policies in the Class Loader
 
  
  - for JAR files: 3.5.2. A JAR File Class Loader
 
  
  - loading resources with: 3.6.2. Loading Resources
 
  
  - of most recently called class: 6.1. Protected Methods of the Security Manager
 
  
  - namespaces and: 3.1.2. Class Loaders and Namespaces
 
  
  - network permissions in: 6.3.3. Network Permissions in the Class Loader
 
  
  - protection domains and: 5.4. Protection Domains
 
  
  - protocols and: 3.5. Extensions to the Class Loader
 
  
  - RMIClassLoader class: 3.2.3. The RMI Class Loader
 
    - 3.2.6. Choosing the Right Class Loader
 
    - D.8. Miscellaneous Packages
 
  
 
  
  - security enforcement: 3.1.1. Class Loaders and Security Enforcement
 
  
  - security manager and: 3.1.1. Class Loaders and Security Enforcement
 
    - 3.2. Anatomy of a Class Loader
 
    - 6.1. Protected Methods of the Security Manager
 
  
 
  
  - types of: 3.2.1. The Internal Class Loader
 
  
  - URLClassLoader class: D.8. Miscellaneous Packages
 
 
- ClassCastException: 2.1. Java Language Security Constructs
 
- classDepth( ): 6.1. Protected Methods of the Security Manager
 
- classes
 
  
  - access to members of: 4.3.7. Methods Protecting Security Aspects
 
  
  - for algorithms: 8.1.1. Components of the Architecture
 
  
  - authenticating (see authentication)
 
  
  - class loader depth: 6.1.1. The Class Loader Depth
 
  
  - defining: 3.4.3. Implementing Security Policies in the Class Loader
 
    - 6.2.1. The Class Loader and the Security Manager
 
  
 
  
  - different class loaders and: 3.1.2. Class Loaders and Namespaces
 
  
  - engine classes: 8.1.1. Components of the Architecture
 
    
    - architecture of: 8.4. The Architecture of Engine Classes
 
  
 
  
  - for message digests, creating: 9.3. Implementing a MessageDigest Class
 
  
  - involved in calling security manager: 6.1. Protected Methods of the Security Manager
 
  
  - loading: 3.2. Anatomy of a Class Loader
 
    - 3.3. Loading Classes
 
    - 3.3. Loading Classes
 
    - 6.2.1. The Class Loader and the Security Manager
 
    
    - caching loaded classes: 3.4.1.1. Protected methods in the ClassLoader class
 
    
    - delegation model for: 3.6.1. Delegation
 
    
    - from JAR files: 3.5.2. A JAR File Class Loader
 
    
    - from multiple sites: 3.5.1. Loading from Multiple Sites
 
    
    - from URLs: 3.2.5. The URL Class Loader
 
  
 
  
  - not verifying: 2.2.2.3. Controlling bytecode verification
 
  
  - protection domains and: 5.4. Protection Domains
 
  
  - resolving: 3.2. Anatomy of a Class Loader
 
    - 3.4.1.1. Protected methods in the ClassLoader class
 
  
 
  
  - of the same package: 3.1.2. Class Loaders and Namespaces
 
  
  - sealed classes: 13.8. Sealed Objects
 
    - D.5. Package javax.crypto
 
  
 
  
  - SecureClassLoader class: 3.2.4. The Secure Class Loader
 
    - D.1. Package java.security
 
  
 
  
  - SPI classes: 8.4. The Architecture of Engine Classes
 
  
  - trusted vs. untrusted: 4.2. Trusted and Untrusted Classes
 
    - 6.1. Protected Methods of the Security Manager
 
  
 
 
- classes, signed: 12.2. Signed Classes
 
- ClassLoader class: 3.4.1. Implementing the ClassLoader Class
 
  
  - caching loaded classes: 3.4.1.1. Protected methods in the ClassLoader class
 
  
  - delegation model for: 3.6.1. Delegation
 
 
- classLoaderDepth( ): 6.1.1. The Class Loader Depth
 
- CLASSPATH environment variable: 1.4.2. Built-in Java Application Security
 
  - 4.2. Trusted and Untrusted Classes
 
 
- client sockets: 4.3.3. Methods Relating to Network Access
 
- clipboard, access to: 4.3.6. Methods Protecting System Resources
 
- CN (common name): 11.1.1. Principals
 
- code sources: 5.1. The CodeSource Class
 
  
  - permissions for (see security policy)
 
  
  - protection domains: 5.4. Protection Domains
 
    - 5.4. Protection Domains
 
  
 
 
- CODEBASE attribute: 3.1.2. Class Loaders and Namespaces
 
  - 3.5.1. Loading from Multiple Sites
 
 
- codeBase entry (policy file): 5.3.1. The Default Policy
 
- codebases
 
  
  - managing with policytool: A.3.1. Managing Policy Codebases
 
  
  - permissions for: A.3.2. Managing Permissions
 
 
- CodeSource( ): 5.1. The CodeSource Class
 
- CodeSource class: 5.1. The CodeSource Class
 
  - D.1. Package java.security
 
 
- collections of permissions: 5.2.5. Permission Collections
 
- com.sun.crypto.provider.SunJCE class: 13.2. The Sun Security Provider in the JCE
 
  
  - cipher algorithms: 13.5.2. Cipher Algorithms
 
  
  - encryption modes: 13.5. Encrypting Data
 
  
  - key agreement algorithm: 13.7. Symmetric Key Agreement
 
  
  - padding schemes: 13.5. Encrypting Data
 
 
- commercial software: 7.1. The Need for Authentication
 
  - C.2. Third-Party Security Providers
 
 
- common name (CN): 11.1.1. Principals
 
- compiler
 
  
  - enforcing Java language rules: 2.2.1. Compiler Enforcement
 
  
  - writing illegal code: 2.2.2. The Bytecode Verifier
 
 
- constants (final variables): 2.1. Java Language Security Constructs
 
  - 2.2.2. The Bytecode Verifier
 
 
- containsAlias( ), KeyStore class: 11.2. The KeyStore Class
 
- CRLs (certificate revocation lists): 10.4.5. Revoked Certificates
 
- cryptographic keys: 7.3.2. Cryptographic Keys
 
  
  - public/private key pairs: 7.3.2. Cryptographic Keys
 
  
  - secret keys: 7.3.2. Cryptographic Keys
 
 
- cryptography
 
  
  - authentication, role of: 7.2. The Role of Authentication
 
  
  - authentication vs. encryption: 7.1.2. Data Authentication
 
  
  - certificates (see certificates)
 
  
  - encryption export restrictions: 13.1. Export Restrictions
 
  
  - encryption strength: 10.2.1. Using the KeyPairGenerator Class
 
    - 11.3. A Key Management Example
 
  
 
  
  - engines for: 7.3. Cryptographic Engines
 
  
  - JCE (see JCE)
 
  
  - keys for (see keys, cryptographic)
 
  
  - reasons for: 7.1. The Need for Authentication
 
 
- -csr option (keystore): A.1.3. Adding a Key Entry
 
- CSRs (certificate signing requests): A.1.3. Adding a Key Entry
 
- currentClassLoader( ): 6.1. Protected Methods of the Security Manager
 
- currentLoadedClass( ): 6.1. Protected Methods of the Security Manager
 
- custom class loaders: 3.2.6. Choosing the Right Class Loader
 
- customizing
 
  
  - network security model: 6.3.2. Implementing Network Access
 
  
  - security managers: 6. Implementing Security Policies
 
 
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2001
O'Reilly & Associates, Inc.
All Rights Reserved.