Index of Patterns
Entries in lowercase refer to external citations of patterns.
Entries in uppercase refer to citations of patterns described in this book.
Abstract Factory
ABSTRACT IDS
Abstract Session
ABSTRACT VIRTUAL PRIVATE NETWORK
Access Control List
ACCESS CONTROL LIST
Access Control/Authorization
Access Matrix
Access Session
Adapter
Administrator Hierarchy
ADMINISTRATOR HIERARCHY
AMBIENT ASSISTED LIVING
Application Controller
Application Firewall
APPLICATION FIREWALL
Asset Valuation
ASYMMETRIC ENCRYPTION
Asynchronous Queuing
Attribute Based Access Control
Attribute-Based Access Control
Attribute-Based SAML Assertion
Audit Log
Audit Trail
Authenticated Call
Authentication
Authentication SAML assertion
Authenticator
AUTHENTICATOR
Authorization
AUTHORIZATION
Authorization SAML assertion
BEHAVIOR-BASED IDS
Blackboard
Broker
Broker Revisited
(Service) Broker
Brokered Authentication
Builder
Call Hijacking in VoIP
Call Interception in VoIP
Capability
CAPABILITY
Check Point
CIRCLE OF TRUST
Composite
Concrete Reference Monitor
Content Firewall
Controlled Access Session
CONTROLLED ACCESS SESSION
CONTROLLED EXECUTION DOMAIN
Controlled-Object Factory
CONTROLLED-OBJECT FACTORY
Controlled-Object Monitor
CONTROLLED-OBJECT MONITOR
Controlled-Process Creator
CONTROLLED-PROCESS CREATOR
CREDENTIAL
Credential Tokenizer
Data Filter Architecture
Data Filtering
Demilitarized Zone
DENIAL-OF-SERVICE IN VOIP
DIGITAL SIGNATURE WITH HASHING
Distributed Authenticator
e-commerce secure patterns
Get Security Patterns in Practice: Designing Secure Architectures Using Software Patterns now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.