Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

 <  Day Day Up  >    

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y]

padding

        block cipher processing 2nd

        RSA cryptography 2nd

Passport (Microsoft)

        SAML and 2nd 3rd

PasswordDigest

        UsernameToken and 2nd

passwords

        UsernameToken 2nd

PDP (Policy Decision Point)

PEP (Policy Enforcement Point)

PGP (Pretty Good Privacy) 2nd 3rd

PKI

        CAs 2nd 3rd

                revocation 2nd 3rd

                root CAs 2nd 3rd

        downstream concepts

        key escrow 2nd

        trust services

                ACS

                billing services 2nd 3rd

                built-in security

                DSS

                metering services 2nd 3rd

                SSO

                XKMS

PKI (Public Key Infrastructure) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th

plaintext

        cryptography and

plumbing

pointers

        XML Signature

portable trust

portals 2nd 3rd 4th

        integration 2nd

ports

        WSDL and

prime numbers

        testing for 2nd 3rd 4th 5th

private keys

        public key encryption

processors

        SOAP

profiles

        SAML 2nd 3rd

                Project Liberty

                WS-Security and 2nd 3rd

Project Liberty (SAML)

        digital identities 2nd 3rd

        federated identities

        profiles

        uses 2nd 3rd 4th

protocols

        SAML 2nd 3rd 4th 5th 6th

                responses 2nd

        SSL 2nd 3rd 4th

PRP (Policy Retrieval Point)

public key

        shared key comparison

public key cryptography 2nd

public key encryption 2nd 3rd 4th

        limitations 2nd

        message digests

        WS SecureConversation

public key technologies

        digital signatures 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

                XML and 2nd

        limitations 2nd

        PKI 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th

        public key encryption 2nd 3rd 4th

        SSL 2nd 3rd 4th 5th 6th 7th 8th 9th

        TLS 2nd 3rd 4th 5th 6th 7th 8th 9th

public key technology

        cryptography 2nd 3rd

public keys

        CA revocation 2nd 3rd

 <  Day Day Up  >    

Категории