Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

 <  Day Day Up  >    

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y]

testing

        numbers for primality 2nd 3rd 4th 5th

TextEncoding assertion, WS Policy

tickets

        Kerberos tokens

time stamps

        SOAP messages 2nd 3rd 4th 5th

TLS (Transport Layer Security) 2nd 3rd 4th 5th 6th 7th 8th 9th

tModels (UDDI)

tokens

        Kerberos

                tokens

        WebLogic Workshop 2nd

Transform element (XML Signature) 2nd 3rd

        Base-64 transform

        canonicalization transform

        Enveloped Signature Transform 2nd

        XPath Filter 2.0 Transform 2nd

        XPath Filtering Transform 2nd

        XSLT Transform

transforms

       XML Signature

                usage 2nd

transport security

        SOAP message security and 2nd 3rd 4th 5th 6th 7th 8th 9th

transport-level security

       WebLogic Workshop

                Web services 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th

transport-level security, WebLogic Workshop and 2nd

triange, security

trust assertions, SAML 2nd

trust relationships

        Security Token Services

        WS Privacy and 2nd 3rd

        WS Trust and 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

trust services

        ACS

        billing services 2nd 3rd

        built-in security

        DSS

        metering services 2nd 3rd

        SSO

        XKMS

 <  Day Day Up  >    

Категории