Flylib.com
Secure XML: The New Syntax for Signatures and Encryption
Secure XML: The New Syntax for Signatures and Encryption
ISBN: 0201756056
EAN: 2147483647
Year: 2005
Pages: 186
Authors:
Donald E. Eastlake
,
Kitty Niles
BUY ON AMAZON
Main Page
Table of content
Copyright
Preface
Notations
Acknowledgments
Part I: Introduction
Chapter 1. XML and Security
1.1 XML
1.2 The Need for Secure XML
1.3 Status of XML Security Standardization
1.4 Work in Progress
Chapter 2. Digital Cryptography Basics
2.1 Message Digests
2.2 Message Authentication Codes
2.3 Secret or Symmetric Key Ciphers
2.4 Public or Asymmetric Key Ciphers
2.5 Asymmetric Keys and Authentication
2.6 Digital Signatures
2.7 Certificates
2.8 Enveloped Encryption
2.9 Canonicalization
2.10 Randomness
2.11 Other Facets of Security
2.12 Cryptography: A Subtle Art
Part II: XML Basics
Chapter 3. The Extensible Markup Language
3.1 Related Standards and Recommendations
3.2 XML Documents
3.3 XML Document Structure
3.4 XML Document Logical Structure
3.5 XML Namespaces
3.6 XML Document Physical Structure
3.7 XML and Stylesheets
Chapter 4. XML Document Type Definitions
4.1 Introduction to DTDs
4.2 Document Type Declarations
4.3 Element Type Declarations
4.4 Defining Attributes in DTDs
4.5 Entity Reference Declarations
4.6 Notation Declarations
Chapter 5. XML Schema
5.1 Overview
5.2 Types
5.3 Elements and Attributes
5.4 Namespaces
5.5 Miscellaneous Aspects of Schemas
5.6 Parts Not Covered
Chapter 6. XPath: A Basic Building Block
6.1 Introduction to XPath
6.2 Data Model
6.3 Location Paths
6.4 Expressions
6.5 Function Library
Chapter 7. URIs, xml:base, and XPointer
7.1 URIs
7.2 xml:base
7.3 XPointer
Chapter 8. SOAP
8.1 Introduction to SOAP
8.2 SOAP Envelope, Message Exchange, and Processing Model
8.3 SOAP Encoding
8.4 SOAP Transport Binding and HTTP
8.5 SOAP Remote Procedure Call
Part III: Canonicalization and Authentication
Chapter 9. XML Canonicalization: The Key to Robustness
9.1 CanonicalizationEssential for Signatures Over XML
9.2 Canonical XML and XML Encryption
9.3 Transformative Summary
9.4 The XML Canonicalization Data Model
9.5 Formal Generative Specification
9.6 Limitations of XML Canonicalization
Chapter 10. XML Signatures and Authentication
10.1 Introduction to XML Digital Signatures
10.2 XML Signature Syntax
10.3 XML Signature Examples
10.4 Transforms and the Use of XPath
10.5 Processing Rules
10.6 Security of Signatures
Chapter 11. Profiling XMLDSIG for Applications
11.1 P3P XMLDSIG
11.2 SOAP XMLDSIG
Chapter 12. ETSI Advanced XML Signatures
12.1 Levels of XAdES Signature
12.2 XAdES Signature Syntax Basics
12.3 XAdES Signature Elements Syntax
12.4 Validation Data Syntax
Part IV: Keying
Chapter 13. The KeyInfo Element
KeyInfo Element Syntax
KeyInfo Child Elements
Private Keys
13.1 The KeyValue Element
13.2 The EncryptedKey Element
13.3 The RetrievalMethod Element
13.4 The AgreementMethod Element
13.5 The KeyName Element
13.6 The X509Data Element
13.7 The PGPData Element
13.8 The SPKIData Element
13.9 The MgmtData Element
Chapter 14. XKMS: XML Key Management
Namespaces
14.1 The Key Information Service
14.2 XKMS Common Data Elements
14.3 The Key Registration Service
14.4 XKMS Cryptographic Algorithms
14.5 Security Considerations
Part V: Encryption
Chapter 15. XML Encryption
15.1 Introduction to XML Encryption
15.2 XML Encryption Syntax
15.3 Encryption Examples
15.4 Processing Flow
15.5 Encryption Security Considerations
Chapter 16. Combining Encryption and Signature
16.1 General Considerations
16.2 The Decryption Transform
Part VI: Algorithms
Chapter 17. Overview of Algorithms
17.1 Algorithm Syntax
17.2 Algorithmic Roles
Chapter 18. Cryptographic Algorithms
18.1 Message Digests
18.2 Key Agreement Algorithms
18.3 Message Authentication Codes
18.4 Signature Algorithms
18.5 Block Encryption Algorithms
18.6 Stream Encryption Algorithms
18.7 Key Transport Algorithms
18.8 Symmetric Key Wrap Algorithms
Chapter 19. Non-cryptographic Algorithms
19.1 Canonicalization Algorithms
19.2 Transformation Algorithms
Part VII: Appendixes
Appendix A. XML Security Implementations
A.1 Apache
A.2 Baltimore Technologies
A.3 Capslock
A.4 Done Information
A.5 DSTC
A.6 Entrust
A.7 Fujitsu
A.8 GapXse
A.9 HP Web Services
A.10 IAIK
A.11 IBM
A.12 Infomosaic
A.13 JDSS II
A.14 Mather
A.15 Microsoft
A.16 NEC
A.17 Phaos Technology
A.18 Poupou
A.19 RSA Security
A.20 Siggen
A.21 Verisign
A.22 W3C
A.23 WebSig
A.24 Wedgetail
A.25 XML Sec
Appendix B. The W3C and W3C Documents
B.1 Access to W3C Documents
B.2 W3C Document Status
B.3 W3C Document Format
B.4 W3C Document Disclaimer
B.5 W3C Software Disclaimer
Appendix C. The IETF and IETF Documents
C.1 RFC Status
C.2 Access to RFCs
C.3 RFC Format
Appendix D. The NIST and NIST Documents
D.1 Access to NIST FIPS Documents
D.2 Status of NIST Documents
D.3 Format of FIPS
Appendix E. The Paper and Protocol Points of View
E.1 The Basic Points of View
E.2 Questions of Meaning
E.3 Processing Models
E.4 Security and Canonicalization
E.5 Unique Internal Labels
E.6 Examples
E.7 Resolution of the Points of View
Appendix F. SOAP Encoding Schema
References and Acronyms
Secure XML: The New Syntax for Signatures and Encryption
ISBN: 0201756056
EAN: 2147483647
Year: 2005
Pages: 186
Authors:
Donald E. Eastlake
,
Kitty Niles
BUY ON AMAZON
Strategies for Information Technology Governance
Measuring and Managing E-Business Initiatives Through the Balanced Scorecard
A View on Knowledge Management: Utilizing a Balanced Scorecard Methodology for Analyzing Knowledge Metrics
Managing IT Functions
The Evolution of IT Governance at NB Power
Governance Structures for IT in the Health Care Industry
Introduction to 80x86 Assembly Language and Computer Architecture
Parts of a Computer System
Bit Manipulation
Decimal Arithmetic
Input/Output
Appendix D 80x86 Instructions (by Mnemonic)
101 Microsoft Visual Basic .NET Applications
Working with the Microsoft Visual Basic .NET Language
Working with Console Applications
GDI+
Visual Studio .NET
Securing Applications
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
The EDIT Command
Table Joins
Executing a Script
Scripting Issues with iSQL*Plus
Table Constraints
What is Lean Six Sigma
The Four Keys to Lean Six Sigma
Key #4: Base Decisions on Data and Facts
Making Improvements That Last: An Illustrated Guide to DMAIC and the Lean Six Sigma Toolkit
The Experience of Making Improvements: What Its Like to Work on Lean Six Sigma Projects
Six Things Managers Must Do: How to Support Lean Six Sigma
Special Edition Using FileMaker 8
Understanding Database Design
Custom Web Publishing
Other Custom Web Publishing Commands and Parameters
About the FileMaker XSLT Extensions
Deploying and Extending FileMaker
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies