Index: P
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: P
- package (default) access level: 2.1. Java Language Security Constructs
 
- packages
 
  
  - access to: 4.3.7. Methods Protecting Security Aspects
 
    - 6.3.5. Implementing Package Access
 
  
 
  
  - classes of the same: 3.1.2. Class Loaders and Namespaces
 
  
  - defining classes in: 3.4.3. Implementing Security Policies in the Class Loader
 
  
  - security policy for: 6.3.7.4. Implementing network, thread, and package access
 
 
- padding schemes: 13.5. Encrypting Data
 
  - 13.5. Encrypting Data
 
  - 13.6.1. The CipherOutputStream Class
 
 
- pairs of cryptographic keys: 7.3.2. Cryptographic Keys
 
  
  - DSAKeyPairGenerator interface: D.3. Package java.security.interfaces
 
  
  - DSAPrivateKey, DSAPublicKey interfaces: 10.1.1.1. DSA keys
 
    - D.3. Package java.security.interfaces
 
    - D.3. Package java.security.interfaces
 
  
 
  
  - DSAPublicKeySpec, DSAPrivateKeySpec classes: 10.3.3.2. The AlgorithmParameterSpec interface
 
    - D.4. Package java.security.spec
 
  
 
  
  - factories (see keys, cryptographic; key factories)
 
  
  - key pair generators: 10.2. The KeyPairGenerator Class
 
    
    - implementing: 10.2.3. Implementing a Key Pair Generator
 
  
 
  
  - KeyPair class: 10.1.2. The KeyPair Class
 
    - D.1. Package java.security
 
  
 
  
  - KeyPairGenerator class: D.1. Package java.security
 
  
  - KeyPairGeneratorSpi class: D.1. Package java.security
 
  
  - symmetric key agreements: 13.7. Symmetric Key Agreement
 
 
- passwords
 
  
  - for keystore entries: A.1.1. Global Options to keytool
 
    - A.1.4. Modifying Keystore Entries
 
  
 
  
  - for keystores: 11.2. The KeyStore Class
 
    - 11.3. A Key Management Example
 
    - A.1.1. Global Options to keytool
 
    - A.1.8. Miscellaneous Commands
 
  
 
  
  - for message digests: 9.1.1. Secure Message Digests
 
 
- patents on encryption technologies: 13.1. Export Restrictions
 
- PBEKeySpec class: 13.4.2.1. Secret key specifications
 
  - D.7. Package javax.crypto.spec
 
 
- PBEParameterSpec class: 13.4.2.1. Secret key specifications
 
  - D.7. Package javax.crypto.spec
 
 
- PBEWithMD5AndDES algorithm: 13.5.2. Cipher Algorithms
 
- PCBC encryption mode: 13.5. Encrypting Data
 
- performance
 
  
  - delayed bytecode verification: 2.2.2.2. Delayed bytecode verification
 
  
  - JAR files: 3.5.2. A JAR File Class Loader
 
 
- Permission( ), Permission class: 5.2.3. Using the Permission Class
 
- permissions: 5.2. Permissions
 
  - 5.2. Permissions
 
  - (see also access controller)
 
  
  - BasicPermission class: 5.2.4. The BasicPermission Class
 
  
  - codebase, managing: A.3.2. Managing Permissions
 
  
  - granting all: 5.2.2. Permissions of the Java API
 
  
  - guarded objects: 5.6. Guarded Objects
 
  
  - Java API: 5.2.2. Permissions of the Java API
 
  
  - Java properties: 5.2.2. Permissions of the Java API
 
    - D.8. Miscellaneous Packages
 
  
 
  
  - Java runtime: 5.2.2. Permissions of the Java API
 
    - 6.3.6. Establishing a Security Policy in 1.2
 
    - D.8. Miscellaneous Packages
 
  
 
  
  - network permissions in class loader: 6.3.3. Network Permissions in the Class Loader
 
  
  - networking: 5.2.2. Permissions of the Java API
 
    - 6.3.6. Establishing a Security Policy in 1.2
 
    - D.8. Miscellaneous Packages
 
  
 
  
  - packages: 6.3.5. Implementing Package Access
 
  
  - Permission class: 5.2. Permissions
 
    - D.1. Package java.security
 
    
    - guarded objects and: 5.6. Guarded Objects
 
    
    - how to use: 5.2.3. Using the Permission Class
 
  
 
  
  - permission collections: 5.2.5. Permission Collections
 
  
  - PermissionCollection class: 5.2.5. Permission Collections
 
    - D.1. Package java.security
 
  
 
  
  - Permissions class: 5.2.6. The Permissions Class
 
  
  - protection domains: 5.4. Protection Domains
 
    - 5.4. Protection Domains
 
  
 
  
  - resolving external: 5.2.2. Permissions of the Java API
 
  
  - SecurityManager methods and: 6.3.6. Establishing a Security Policy in 1.2
 
  
  - serialization: 5.2.2. Permissions of the Java API
 
    - D.8. Miscellaneous Packages
 
  
 
  
  - sockets: 5.2.2. Permissions of the Java API
 
    - 6.3.6. Establishing a Security Policy in 1.2
 
    - D.8. Miscellaneous Packages
 
  
 
  
  - specifying for code sources (see security policy)
 
  
  - threads: 6.3.4. Implementing Thread Security
 
  
  - windowing resources: 5.2.2. Permissions of the Java API
 
 
- Permissions class: D.1. Package java.security
 
- PKCS7 block files: 12.2.1. Reading Signed JAR Files
 
- PKCS8EncodedKeySpec class: 10.3.3.1. The EncodedKeySpec class
 
  - D.4. Package java.security.spec
 
 
- PKCS5Padding scheme: 13.5. Encrypting Data
 
- Policy class: 5.3. The Policy Class
 
  - D.1. Package java.security
 
 
- policy codebases
 
  
  - managing with policytool: A.3.1. Managing Policy Codebases
 
  
  - permissions: A.3.2. Managing Permissions
 
 
- policy entries: 5.3.1. The Default Policy
 
- PolicyFile class: 5.3. The Policy Class
 
- policytool tool: A.3. The policytool
 
- policy.url.# properties: 5.3.1. The Default Policy
 
- ports in socket permission names: 5.2.2. Permissions of the Java API
 
- primordial class loader: 3.2.1. The Internal Class Loader
 
- Principal interface: D.1. Package java.security
 
- principals: 11.1.1. Principals
 
- Principle interface: 11.1.1. Principals
 
- -printcert option (keystore): A.1.6. Examining Keystore Data
 
- printing
 
  
  - certificates: A.1.6. Examining Keystore Data
 
  
  - permissions: 5.2.3. Using the Permission Class
 
  
  - printer access: 4.3.6. Methods Protecting System Resources
 
 
- priority, thread: 2.1. Java Language Security Constructs
 
- privacy, snooping: 7.1.2. Data Authentication
 
- private access level: 2.1. Java Language Security Constructs
 
- private cryptographic keys: 7.3.2. Cryptographic Keys
 
  
  - DHPrivateKeySpec class: 13.4.2.1. Secret key specifications
 
  
  - DSAPrivateKey interface: 10.1.1.1. DSA keys
 
    - D.3. Package java.security.interfaces
 
    - D.3. Package java.security.interfaces
 
  
 
  
  - DSAPrivateKeySpec class: 10.3.3.2. The AlgorithmParameterSpec interface
 
    - D.4. Package java.security.spec
 
  
 
  
  - encrypting: 11.3. A Key Management Example
 
  
  - generating: 10.2. The KeyPairGenerator Class
 
  
  - importing: 10.3.1. Using the KeyFactory class
 
  
  - JCE interfaces for: 13.3. Key Types in the JCE
 
    - D.6. Package javax.crypto.interfaces
 
  
 
  
  - PrivateKey interface: 10.1.1. The Key Interface
 
    - D.1. Package java.security
 
  
 
  
  - RSAPrivateKey interface: D.3. Package java.security.interfaces
 
  
  - RSAPrivateKeySpec class: 13.4.2.1. Secret key specifications
 
    - D.4. Package java.security.spec
 
  
 
  
  - signers: B.1.2. Signers
 
    - B.3.2. Implementing a Signer Class
 
    - D.1. Package java.security
 
  
 
  
  - symmetric key agreements: 13.7. Symmetric Key Agreement
 
 
- private identity scopes: B.3.3. A Shared System Identity Scope
 
- programs: 1.3. Applications, Applets, and Programs
 
  
  - bytecode verification: 1.3.1. Anatomy of a Java Application
 
    - 2.2.2. The Bytecode Verifier
 
    
    - cancelling: 2.2.2.3. Controlling bytecode verification
 
    
    - delayed: 2.2.2.2. Delayed bytecode verification
 
  
 
  
  - element access levels: 2.1. Java Language Security Constructs
 
  
  - enforcing Java language rules: 2.2. Enforcement of the Java Language Rules
 
 
- propagating cipher block chaining mode: 13.5. Encrypting Data
 
- properties
 
  
  - access to: 4.3.6. Methods Protecting System Resources
 
  
  - permissions for: 5.2.2. Permissions of the Java API
 
    - D.8. Miscellaneous Packages
 
  
 
  
  - PropertyPermission class: 5.2.2. Permissions of the Java API
 
    - D.8. Miscellaneous Packages
 
  
 
  
  - substitution for: 5.3. The Policy Class
 
 
- properties, provider: 8.2.2. Implementing the Provider Class
 
- protected access level: 2.1. Java Language Security Constructs
 
- protection domains: 5.4. Protection Domains
 
  
  - network permissions in: 6.3.3. Network Permissions in the Class Loader
 
  
  - ProtectionDomain class: 5.4. Protection Domains
 
    - D.1. Package java.security
 
  
 
 
- protocols and class loaders: 3.5. Extensions to the Class Loader
 
- Provider class: 8.1.1. Components of the Architecture
 
  - 8.2. The Provider Class
 
  - D.1. Package java.security
 
 
- providers (see security providers)
 
- proxy services: 4.3.3. Methods Relating to Network Access
 
- public access level: 2.1. Java Language Security Constructs
 
  
  - final variables and: 2.1. Java Language Security Constructs
 
 
- public identity scope: B.3.3. A Shared System Identity Scope
 
- public key encryption: 7.3.2. Cryptographic Keys
 
  
  - certificates (see certificates)
 
  
  - DHPublicKeySpec class: 13.4.2.1. Secret key specifications
 
    - D.7. Package javax.crypto.spec
 
  
 
  
  - DSAPublicKey interface: 10.1.1.1. DSA keys
 
    - D.3. Package java.security.interfaces
 
    - D.3. Package java.security.interfaces
 
  
 
  
  - DSAPublicKeySpec class: 10.3.3.2. The AlgorithmParameterSpec interface
 
    - D.4. Package java.security.spec
 
  
 
  
  - generated public keys: 10.2. The KeyPairGenerator Class
 
  
  - generating public keys: 10.3.2. Implementing a Key Factory
 
  
  - Identity class: B.1.1. The Identity Class
 
  
  - importing public keys: 10.3.1. Using the KeyFactory class
 
  
  - including key with signatures: 12.1.3. Signing and Certificates
 
  
  - JCE interfaces for public keys: 13.3. Key Types in the JCE
 
    - D.6. Package javax.crypto.interfaces
 
  
 
  
  - PublicKey class: D.1. Package java.security
 
  
  - PublicKey interface: 10.1.1. The Key Interface
 
  
  - RSAPublicKey interface: D.7. Package javax.crypto.spec
 
  
  - RSAPublicKeySpec class: 13.4.2.1. Secret key specifications
 
    - D.4. Package java.security.spec
 
  
 
  
  - symmetric key agreements: 13.7. Symmetric Key Agreement
 
 
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2001
O'Reilly & Associates, Inc.
All Rights Reserved.