Web Services Security

Chapter 2: Presenting Security

Table 2-1: OSI Stack

Chapter 3: New Challenges and New Threats

Table 3-1: OSI Layers

Chapter 8: XML Key Management Specification (XKMS)

Table 8-1: Commonly Cited Public Key Infrastructures
Table 8-2: Members of the KeyBinding Element
Table 8-3: Members Common to Request and Result Elements
Table 8-4: Members of the Request Element
Table 8-5: Members of the Response Element
Table 8-6: Request and Response Elements of the Locate Service
Table 8-7: Request and Response Elements of the Validate Service
Table 8-8: Request and Response Elements of the Register Service The register service may be used from a Java program using the VeriSign TSIK as follows:
Table 8-9: Request and Response Elements of the Recover Service
Table 8-10: Request and Response Elements of the Reissue Service
Table 8.11: Request and Response Elements of the Recover Service

Chapter 10: .NET and Passport

Table 10-1: Passport Cookie Description

Chapter 14: Legal Considerations

Table 14-1: Linking Law to Security
Table 14.2: Legal Effects of Authenticating Acts

Категории