Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

 <  Day Day Up  >    

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y]

ebXML (e-business XML) 2nd

EncryptedData element (XML Encryption) 2nd

EncryptedData schema (XML Encryption) 2nd 3rd 4th

EncryptedKey element (XML Encryption) 2nd 3rd 4th

EncryptedMethod element (XML Encryption) 2nd

EncryptedType element (XML Encryption)

encryption

        AES (Alogrithms Advanced Encryption Standard)

        AES encryption algorithm 2nd

        asymmetric

        cryptography

        DES encryption algorithm 2nd

        hash functions 2nd

                digital signatures and 2nd

                reasons to use 2nd

       keys

                items encrypted with same 2nd 3rd 4th

        modular exponentiation and

        one-way functions

        public key 2nd 3rd 4th

        RSA decryption

        RSA encryption

        secret key

        shared key 2nd 3rd 4th 5th

                XML 2nd 3rd

       shared key encryption

                block ciphers

        super encryption

        symmetric

        WebLogic Workshop

       wrapped key

                XML 2nd 3rd 4th 5th

        WS SecureConversation and

       XML

                attachments 2nd 3rd 4th 5th

                WebLogic Workshop

        XML Encryption 2nd

EncryptionProperties element (XML Encryption) 2nd 3rd

enterprise applications

        integration 2nd

entity references

       DTDs and

                XML Signature 2nd 3rd

ENV namespace (SOAP)

Envelope element (SOAP)

Enveloped Signature Transform 2nd

exchanged information

        security issues 2nd

exclusive canonicalization

 <  Day Day Up  >    

Категории