List of Tables


Chapter 2: Presenting Security

Table 2-1: OSI Stack

Chapter 3: New Challenges and New Threats

Table 3-1: OSI Layers

Chapter 8: XML Key Management Specification (XKMS)

Table 8-1: Commonly Cited Public Key Infrastructures
Table 8-2: Members of the KeyBinding Element
Table 8-3: Members Common to Request and Result Elements
Table 8-4: Members of the Request Element
Table 8-5: Members of the Response Element
Table 8-6: Request and Response Elements of the Locate Service
Table 8-7: Request and Response Elements of the Validate Service
Table 8-8: Request and Response Elements of the Register Service The register service may be used from a Java program using the VeriSign TSIK as follows:
Table 8-9: Request and Response Elements of the Recover Service
Table 8-10: Request and Response Elements of the Reissue Service
Table 8.11: Request and Response Elements of the Recover Service

Chapter 10: .NET and Passport

Table 10-1: Passport Cookie Description

Chapter 14: Legal Considerations

Table 14-1: Linking Law to Security
Table 14.2: Legal Effects of Authenticating Acts




Web Services Security
Web Services Security
ISBN: 0072224711
EAN: 2147483647
Year: 2003
Pages: 105
Authors: Mark ONeill

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net