Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] X-BULK X-KISS (XML key information services) locate service validate service X-KRSS (XML key registration service) recovery registration reissue revocation X.500/LDAP Profile X.509 certificates. [See Certificates and certificate keys] X509v3CertToken XACML (Extensible Access Control Markup Language) access control and policy management architecture data flow usage scenarios ebXML registry policy centralization policy stores SAML collaboration sample policy sample requests sample scenario XACML 2.0 with SAML 2.0 XACML Kit vs. EPAL WSPL from XACML 2.0 XML schema definition XACML kit 2nd XACML Profile XCBF (XML Common Biometric Format) XKMS (XML key management system) 2nd issues motivation specification overview Verisign services X-BULK X-KISS locate service validate service X-KRSS. [See X-KRSS (XML key registration service)] XLST transform algorithms XML (Extensible Markup Language) encryption algorithms anatomy arbitrary content element level example scenarios motivation super encryption firewalls for performance for Web Services in J2EE in Message Inspector pattern in Message Interceptor Gateway pattern signatures algorithms anatomy Assertion Builder pattern creating examples in SAML motivation verifying and validating XACML for XML Common Biometric Format (XCBF) XML Denial of Service (XML-DOS) attacks XML Digital Signature algorithm XML key information services (X-KISS) locate service validate service XML key management system. [See XKMS (XML key management system)] XML key registration service (X-KRSS) recovery registration reissue revocation XML messaging provider strategy XML Schemas 2nd for XACML in Message Inspector pattern in Message Interceptor Gateway pattern XML-aware security infrastructure Message Inspector pattern Message Interceptor Gateway pattern Xpath transform algorithms XrML (Extensible Rights Markup Language) XSS (cross-site scripting) Xverify command |