Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

 <  Day Day Up  >    

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y]

Reference element (XML Signature) 2nd 3rd 4th 5th 6th

        SignatureMethod element 2nd 3rd 4th

referencing

        security tokens 2nd 3rd 4th 5th

                XML signatures and 2nd 3rd

remote applications

        SOAP and 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

rights management

RMI (Remote Method Invocation)

role-based security

        JWS

        WebLogic Workshop

root CAs 2nd 3rd

RosettaNet 2nd

RPC-style SOAP bodies

RSA cryptography 2nd 3rd 4th 5th

        decryption

        encryption

        key pairs 2nd

        padding 2nd

 <  Day Day Up  >    

Категории