Index of Patterns

Entries in lowercase refer to external citations of patterns.

Entries in uppercase refer to citations of patterns described in this book.

Abstract Factory

ABSTRACT IDS

Abstract Session

ABSTRACT VIRTUAL PRIVATE NETWORK

Access Control List

ACCESS CONTROL LIST

Access Control/Authorization

Access Matrix

Access Session

Adapter

Administrator Hierarchy

ADMINISTRATOR HIERARCHY

AMBIENT ASSISTED LIVING

Application Controller

Application Firewall

APPLICATION FIREWALL

Asset Valuation

ASYMMETRIC ENCRYPTION

Asynchronous Queuing

Attribute Based Access Control

Attribute-Based Access Control

Attribute-Based SAML Assertion

Audit Log

Audit Trail

Authenticated Call

Authentication

Authentication SAML assertion

Authenticator

AUTHENTICATOR

Authorization

AUTHORIZATION

Authorization SAML assertion

BEHAVIOR-BASED IDS

Blackboard

Broker

Broker Revisited

(Service) Broker

Brokered Authentication

Builder

Call Hijacking in VoIP

Call Interception in VoIP

Capability

CAPABILITY

Check Point

CIRCLE OF TRUST

Composite

Concrete Reference Monitor

Content Firewall

Controlled Access Session

CONTROLLED ACCESS SESSION

CONTROLLED EXECUTION DOMAIN

Controlled-Object Factory

CONTROLLED-OBJECT FACTORY

Controlled-Object Monitor

CONTROLLED-OBJECT MONITOR

Controlled-Process Creator

CONTROLLED-PROCESS CREATOR

CREDENTIAL

Credential Tokenizer

Data Filter Architecture

Data Filtering

Demilitarized Zone

DENIAL-OF-SERVICE IN VOIP

DIGITAL SIGNATURE WITH HASHING

Distributed Authenticator

e-commerce secure patterns

Get Security Patterns in Practice: Designing Secure Architectures Using Software Patterns now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.