Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

 <  Day Day Up  >    

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y]

X-KISS 2nd 3rd 4th 5th

X-KISS (XML Key Information Service Specification)

X-KRSS 2nd 3rd 4th 5th

X-KRSS (XML Key Registration Service Specification)

X.509 standard

X.509 V3 certificate

        BinarySecurityToken and 2nd 3rd 4th

XACML

        data model 2nd

        layers 2nd 3rd

        policies 2nd 3rd 4th

XACML (extensible Access Control Markup Language) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

XCBF (XML Common Biometric Format)

        security tokens

XKMS

        goals 2nd

        history

        services 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

XKMS (XML Key Management Specification) 2nd 3rd

XML

        digital signatures 2nd 3rd

       Encryption

                block cipher processing 2nd

       encryption

                WebLogic Workshop

        introduction

        namespaces 2nd 3rd 4th 5th 6th 7th

        security and 2nd 3rd 4th 5th 6th 7th

        security tokens

                SAML 2nd 3rd 4th 5th 6th 7th

                XCBF

                XrML 2nd 3rd 4th

        Web services and 2nd

XML (extensible Markup Language)

        history 2nd

XML Decryption Transform 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

XML Encryption 2nd

        AgreementMethod element 2nd 3rd

XML encryption

        attachments 2nd 3rd 4th 5th

XML Encryption

        block cipher padding 2nd

       block cipher processing

                feedback 2nd

        CarriedKeyName element 2nd

        CipherData element 2nd

        EncryptedData element 2nd

        EncryptedData schema 2nd 3rd 4th

        EncryptedKey element 2nd 3rd 4th

        EncryptedMethod element 2nd

        EncryptedType element

        EncryptionProperties element 2nd 3rd

        goals

        KeyInfo element 2nd 3rd

        overview 2nd 3rd

        processes 2nd 3rd 4th 5th

XML encryption

        shared key 2nd 3rd

XML Encryption

        shared key encryption and

XML encryption

        wrapped key 2nd 3rd 4th 5th

XML Encryption

       XML Signature

                using together 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd

        XML Signature and 2nd 3rd

XML Schema 2nd 3rd

        introduction

        SAML assertions

        WSDL and

XML Signature 2nd 3rd 4th

        CanoncalizationMethod element

        Detached Signatures

       DTDs

                entity references 2nd 3rd

        generation 2nd 3rd

        integrity and

        keys

        non- repudiation

       Object elements

                signing

        overview 2nd

        Reference element 2nd

        security model

        shorthand schema

        Signature element 2nd 3rd 4th 5th

                CanonicalizationMethod element 2nd 3rd 4th 5th 6th 7th 8th

                DigestMethod element

                DigestValue element

                KeyInfo element 2nd 3rd 4th 5th 6th 7th 8th

                Object element 2nd 3rd 4th 5th 6th

                Reference element 2nd 3rd 4th

                SignatureMethod element 2nd

                SignatureValue element

                Transform element 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

        SignatureMethod element

        SignedInfo element

        structure 2nd

        transforms 2nd

        URI/URL variants

        validation 2nd 3rd

        W3C standard

        XML Decryption Transform 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

       XML Encryption

                using together 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd

        XML Encryption and 2nd 3rd

XML signatures

        message integrity validation

        security token references 2nd 3rd

        security token validation 2nd

XML Signatures

        WebLogic Workshop

XML signatures

        WS Security example

        WS Security and 2nd

        WS Security example 2nd

XML Transformations 2nd 3rd 4th 5th 6th

        XMLBeans

        XPath

        XQuery 2nd 3rd

        XSLT 2nd

XMLBeans

XPath

XPath Filter 2.0 Transform 2nd

XPath Filtering Transform (XML) 2nd

XQuery 2nd 3rd

XrML

        data model 2nd

XrML (extensible Rights Markup Language) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

        security tokens 2nd 3rd 4th

XSLT (Extensible Stylesheet Language Transformations) 2nd

XSLT Transform

 <  Day Day Up  >    

Категории