index_P

 <  Day Day Up  >    

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y]

padding
        block cipher processing 2nd
        RSA cryptography 2nd
Passport (Microsoft)
        SAML and 2nd 3rd
PasswordDigest
        UsernameToken and 2nd
passwords
        UsernameToken 2nd
PDP (Policy Decision Point)
PEP (Policy Enforcement Point)
PGP (Pretty Good Privacy) 2nd 3rd
PKI
        CAs 2nd 3rd
                revocation 2nd 3rd
                root CAs 2nd 3rd
        downstream concepts
        key escrow 2nd
        trust services
                ACS
                billing services 2nd 3rd
                built-in security
                DSS
                metering services 2nd 3rd
                SSO
                XKMS
PKI (Public Key Infrastructure) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th
plaintext
        cryptography and
plumbing
pointers
        XML Signature
portable trust
portals 2nd 3rd 4th
        integration 2nd
ports
        WSDL and
prime numbers
        testing for 2nd 3rd 4th 5th
private keys
        public key encryption
processors
        SOAP
profiles
        SAML 2nd 3rd
                Project Liberty
                WS-Security and 2nd 3rd
Project Liberty (SAML)
        digital identities 2nd 3rd
        federated identities
        profiles
        uses 2nd 3rd 4th
protocols
        SAML 2nd 3rd 4th 5th 6th
                responses 2nd
        SSL 2nd 3rd 4th
PRP (Policy Retrieval Point)
public key
        shared key comparison
public key cryptography 2nd
public key encryption 2nd 3rd 4th
        limitations 2nd
        message digests
        WS SecureConversation
public key technologies
        digital signatures 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
                XML and 2nd
        limitations 2nd
        PKI 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th
        public key encryption 2nd 3rd 4th
        SSL 2nd 3rd 4th 5th 6th 7th 8th 9th
        TLS 2nd 3rd 4th 5th 6th 7th 8th 9th
public key technology
        cryptography 2nd 3rd
public keys
        CA revocation 2nd 3rd

 <  Day Day Up  >    


Securing Web Services with WS-Security. Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
ISBN: 0672326515
EAN: 2147483647
Year: 2004
Pages: 119

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net