X



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

X-BULK
X-KISS (XML key information services)
     locate service
     validate service
X-KRSS (XML key registration service)
     recovery
     registration
     reissue
     revocation
X.500/LDAP Profile
X.509 certificates. [See Certificates and certificate keys]
X509v3CertToken
XACML (Extensible Access Control Markup Language)
     access control and policy management
     architecture
     data flow
     usage scenarios
         ebXML registry
         policy centralization
         policy stores
         SAML collaboration
         sample policy
         sample requests
         sample scenario
         XACML 2.0 with SAML 2.0
         XACML Kit
     vs. EPAL
     WSPL from
     XACML 2.0
     XML schema definition
XACML kit 2nd
XACML Profile
XCBF (XML Common Biometric Format)
XKMS (XML key management system) 2nd
     issues
     motivation
     specification overview
     Verisign services
     X-BULK
     X-KISS
         locate service
         validate service
    X-KRSS. [See X-KRSS (XML key registration service)]
XLST transform algorithms
XML (Extensible Markup Language)
     encryption
         algorithms
         anatomy
         arbitrary content
         element level
         example scenarios
         motivation
         super encryption
     firewalls
         for performance
         for Web Services
     in J2EE
     in Message Inspector pattern
     in Message Interceptor Gateway pattern
     signatures
         algorithms
         anatomy
         Assertion Builder pattern
         creating
         examples
         in SAML
         motivation
         verifying and validating
     XACML for
XML Common Biometric Format (XCBF)
XML Denial of Service (XML-DOS) attacks
XML Digital Signature algorithm
XML key information services (X-KISS)
     locate service
     validate service
XML key management system. [See XKMS (XML key management system)]
XML key registration service (X-KRSS)
     recovery
     registration
     reissue
     revocation
XML messaging provider strategy
XML Schemas 2nd
     for XACML
     in Message Inspector pattern
     in Message Interceptor Gateway pattern
XML-aware security
     infrastructure
     Message Inspector pattern
     Message Interceptor Gateway pattern
Xpath transform algorithms
XrML (Extensible Rights Markup Language)
XSS (cross-site scripting)
Xverify command




Core Security Patterns. Best Practices and Strategies for J2EE, Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net