Flylib.com
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
ISBN: 0672326515
EAN: 2147483647
Year: 2004
Pages: 119
Authors:
Jothy Rosenberg
,
David Remy
BUY ON AMAZON
Securing Web Services with WS-Security
Table of Contents
Copyright
About the Authors
Acknowledgments
We Want to Hear from You
Forewords
Securing Web Services to Deliver on Their Promise
Building the Foundation for Agile Computing
Introduction
Who This Book Is For
About This Book
How This Book Is Organized
Chapter 1. Basic Concepts of Web Services Security
Web Services Basics: XML, SOAP, and WSDL
Application Integration
Security Basics
Web Services Security Basics
Summary
Chapter 2. The Foundations of Web Services
The Gestalt of Web Services
XML: Meta-Language for Data-Oriented Interchange
SOAP: XML Messaging and Remote Application Access
WSDL: Schema for XMLSOAP Objects and Interfaces
UDDI: Publishing and Discovering Web Services
ebXML and RosettaNet: Alternative Technologies for Web Services
The Web Services Security Specifications
Summary
Chapter 3. The Foundations of Distributed Message-Level Security
The Challenges of Information Security for Web Services
Shared Key Technologies
Public Key Technologies
Summary
Chapter 4. Safeguarding the Identity and Integrity of XML Messages
Introduction To and Motivation for XML Signature
XML Signature Fundamentals
XML Signature Structure
XML Signature Processing
The XML Signature Elements
Security Strategies for XML Signature
Summary
Chapter 5. Ensuring Confidentiality of XML Messages
Introduction to and Motivation for XML Encryption
XML Encryption Fundamentals
XML Encryption Structure
XML Encryption Processing
Using XML Encryption and XML Signature Together
Summary
Chapter 6. Portable Identity, Authentication, and Authorization
Introduction to and Motivation for SAML
How SAML Works
Using SAML with WS-Security
Applying SAML: Project Liberty
Summary
Chapter 7. Building Security into SOAP
Introduction to and Motivation for WS-Security
Extending SOAP with Security
Security Tokens in WS-Security
Providing Confidentiality: XML Encryption in WS-Security
Providing Integrity: XML Signature in WS-Security
Message Time Stamps
Summary
Chapter 8. Communicating Security Policy
WS-Policy
The WS-Policy Framework
WS-SecurityPolicy
Summary
Chapter 9. Trust, Access Control, and Rights for Web Services
The WS- Family of Security Specifications
XML Key Management Specification (XKMS)
eXtensible Access Control Markup Language (XACML) Specification
eXtensible Rights Markup Language (XrML) Management Specification
Summary
Chapter 10. Building a Secure Web Service Using BEA s WebLogic Workshop
Security Layer Walkthrough
WebLogic Workshop Web Service Walkthrough
Summary
Appendix A. Security, Cryptography, and Protocol Background Material
The SSL Protocol
Testing for Primality
RSA Cryptography
DSA Digital Signature Algorithms
Block Cipher Processing
DES Encryption Algorithm
AES Encryption Algorithm
Hashing Details and Requirements
SHA1
Silvio Micali s Fast ValidationRevocation
Canonicalization of Messages for Digital Signature Manifests
Base-64 Encoding
PGP
Glossary
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_R
index_S
index_T
index_U
index_V
index_W
index_X
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
ISBN: 0672326515
EAN: 2147483647
Year: 2004
Pages: 119
Authors:
Jothy Rosenberg
,
David Remy
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Four Ways in Which You Can Respond to Risk
The Policy Framework
Why Risk Assessment
The Goals and Objectives of a Risk Assessment
Document Tracking Form
SQL Tips & Techniques (Miscellaneous)
Creating Indexes for Fast Data Retrieval
Performing Multiple-table Queries and Creating SQL Data Views
Working with SQL JOIN Statements and Other Multiple-table Queries
Understanding Transaction Isolation Levels and Concurrent Processing
Repairing and Maintaining MS-SQL Server Database Files
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Understanding Intrusion Detection
Unauthorized Activity I
Tcpdump
Cisco Secure IDS
Laws, Standards, and Organizations
Ruby Cookbook (Cookbooks (OReilly))
Deleting a File
Doing Aspect-Oriented Programming
Thumbnailing Images
Indexing Unstructured Text with SimpleSearch
Storing Hashed User Passwords in the Database
File System Forensic Analysis
Introduction
MFT Entry Attribute Concepts
Metadata Category
Other Topics
Bibliography
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Using DMAIC to Improve Speed, Quality, and Cost
Value Stream Mapping and Process Flow Tools
Data Collection
Descriptive Statistics and Data Displays
Identifying and Verifying Causes
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies