22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Certificate authorities<br />

Domino 260<br />

internal 255, 258<br />

Certificate Authority 233<br />

Certificate Distribution Points 422<br />

Certificate issuance 233<br />

Certificate repository 235<br />

Certificate Revocation 235<br />

Certificate Revocation List 422, 453<br />

CertificateExpChecked 487<br />

certificates 236<br />

Certification hierarchies 209<br />

CERTREQ.NSF 454<br />

chargen service 391<br />

Check Point Firewall-1 122<br />

Cisco PIX 122<br />

client affinity 183<br />

Common Criteria 54<br />

Common Desktop Environment 409<br />

see CDE<br />

Common stream ciphers 28<br />

Community Services<br />

and reverse proxies 180<br />

CommView 636<br />

Computer Crime and Security Survey 6<br />

Computer network 11<br />

Computer security 12<br />

Computer Security Act of 1987 14<br />

Computer Security Institute 5<br />

Computer system 11<br />

Confidentiality 17, 19, 224<br />

CONNECT 298<br />

Content scanners 129<br />

CR 235<br />

Credential management 99<br />

CRL 453<br />

see Certificate Revocation List<br />

Cryptographic techniques 22<br />

bulk encryption 22<br />

Cryptography 22<br />

Asymmetric key algorithms 30<br />

Symmetric ciphers 24<br />

Symmetric key algorithms 23<br />

CSI 5<br />

Customized HTML log-in form 246<br />

D<br />

Data Access to Data Access Zone Flows 158<br />

688 Lotus Security Handbook<br />

Data Access to Internet Zone Flows 158<br />

Data Access to Intranet Zone Flows 156<br />

Data Access to Proxy Zone Flows 155<br />

Data Access Zone 140<br />

Data classification 150<br />

Data confidentiality 99<br />

Data Encryption Standard 27<br />

Data flow<br />

authentication requirements 149<br />

example 160<br />

policies 146, 151<br />

Data flows 97<br />

Data integrity 17–18, 106, 222<br />

daytime service 390<br />

DEAS<br />

see Domino Everyplace Access<br />

DEBUG_SSO_TRACE_LEVEL 292<br />

Default logout time period 247<br />

DefaultLogFileFolder 373<br />

DELETE 298<br />

denial of service attack 48<br />

DES<br />

see Data Encryption Standard<br />

D-H 32<br />

dictionlist 402<br />

Diffie-Hellman 32<br />

Digital signatures 35<br />

example 36<br />

trusting 38<br />

digital signatures 222<br />

directories<br />

a scenario implementation 611<br />

account provisioning 348<br />

authoritative sources 312<br />

data management 314<br />

fundamentals 310<br />

identity mapping 323<br />

metadirectories 339<br />

multiple identities 322<br />

example 322<br />

point of control 313<br />

synchronization 315<br />

synchronization tools 326<br />

unified directory 339<br />

directory 315<br />

directory assistance 458<br />

database 476<br />

Directory Integrator<br />

see Tivoli Directory Integrator

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!