index_S

 <  Day Day Up  >    

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y]

SAML 2nd
       addresses
                problems with 2nd 3rd 4th
        assertions
                attribute 2nd
                authorizatin 2nd
                elements 2nd
                XML Schema
        attribute assertions
        attribute requests 2nd
        authentication assertions 2nd 3rd 4th 5th 6th
        authentication context 2nd 3rd
        authentication requests 2nd
        authorization assertions
        authorization requests 2nd 3rd 4th 5th
        bindings
        Microsoft Passport and 2nd 3rd
        overview 2nd 3rd 4th 5th 6th 7th
        PDP
        PEP
        portable trust and
        profiles 2nd 3rd
                Project Liberty
                WS Security and
                WS Security and 2nd
        Project Liberty
                digital identities 2nd 3rd
                federated identities
                profiles
                uses 2nd 3rd 4th
        protocols 2nd 3rd 4th 5th 6th
                responses 2nd
        PRP
        security tokens 2nd 3rd 4th 5th 6th 7th
        trust assertions 2nd
        WS Federation and
SAML (Security Assertion Markup Language)
SAML bindings 2nd 3rd 4th
secret key encryption
security
        authentication 2nd 3rd
        authorization 2nd 3rd
       built-in
                trust services and
        confidentiality
        cryptography
                public key 2nd
                shared key
        integrity 2nd
        keys
       message-based
                WebLogic Workshop Web services 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th
       message-level
                WebLogic Workshop 2nd 3rd 4th
        non- repudiation 2nd 3rd
        overview 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
       role-based
                JWS and
                WebLogic Workshop
        SHA-1
        SOAP and
        tokens
       transport-level
                WebLogic Workshop and 2nd
                WebLogic Workshop Web services 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th
       Web Services
                issues 2nd 3rd
        WebLogic Security Framework
        WSDL and
        XML and 2nd 3rd 4th 5th 6th 7th
       XML Signature
                keys
                security model
security context establishment
security specifications 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th
Security Token Services
        trust and
security tokens
        referencing 2nd 3rd 4th 5th
        SOAP 2nd 3rd 4th 5th
        WS Security 2nd 3rd
                BinarySecurityToken
                referencing
                XML tokens 2nd 3rd 4th
        WS Security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th
                BinarySecurityToken 2nd 3rd 4th 5th 6th
                referencing 2nd 3rd 4th 5th 6th 7th 8th
                UsernameToken 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
                validation 2nd
                XML tokens 2nd 3rd 4th 5th 6th 7th 8th 9th
        XML
                SAML 2nd 3rd 4th 5th 6th 7th
                XCBF
                XrML 2nd 3rd 4th
SecurityHeader assertion, WS SecurityPolicy 2nd
SecurityToken assertion, WS SecurityPolicy 2nd 3rd 4th 5th 6th 7th
service-oriented architectures
session keys
SGML (Standard Generalized Markup Language)
SHA-1
        security
SHA-1 (Secure Hash Algorithm 1)
SHA-1 (Secure Hash Algorithms)
        collision resistance 2nd
shared authentication
shared key
        public key comparison
shared key cryptography
shared key encryption 2nd 3rd 4th 5th
        block ciphers
        XML 2nd 3rd
        XML Encryption and
shared key technologies
        Kerberos 2nd 3rd
        limitations
shared key technology
        cryptography 2nd 3rd
shared keys
        Kerberos
shared technologies
        encryption 2nd 3rd 4th 5th
Signature element (XML Signature) 2nd 3rd 4th 5th
        CanonicalizationMethod element 2nd 3rd 4th 5th 6th 7th 8th
        DigestMethod element
        DigestValue element
        KeyInfo element 2nd 3rd 4th 5th 6th 7th
                KeyName element
                KeyValue element
                PGPData element
                Retrieval element
                SPKIData element
                X509Data element
        Object element 2nd 3rd 4th
                Manifest element
                SignatureProperties element
        SignatureMethod element 2nd
        SignatureValue element
        Transform element 2nd 3rd
                Base-64 transform
                canonicalization transform
                Enveloped Signature Transform 2nd
                XPath Filter 2.0 Transform 2nd
                XPath Filtering Transform 2nd
                XSLT Transform
SignatureMethod element (XML Signature) 2nd 3rd
SignatureProperties element (XML Signature)
signatures
        DSA Signatures 2nd 3rd 4th
        hash functions 2nd
SignatureValue element (XML Signature)
SignedInfo element (XML Signature)
signing
        digital signatures and
Silvio Micali, validation/revocation 2nd 3rd 4th 5th
SOA (service-oriented architecture)
SOAP
        attachments 2nd
        body 2nd 3rd
                RPC-style
        envelope
        extending with security 2nd 3rd 4th 5th
        header
        headers 2nd
        introduction 2nd 3rd
       message security
                transport level security and 2nd 3rd 4th 5th 6th 7th 8th 9th
       messages
                time stamps 2nd 3rd 4th 5th
        processors
        remote applications and 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
        security and
        security tokens 2nd 3rd 4th 5th
       WS Security
                encrypted attachments
       WS Security and
                security token references
        WSDL and 2nd
        WS SecureConversation and 2nd 3rd 4th 5th 6th 7th 8th 9th
       WS Security
                encrypted attachments 2nd 3rd
                headers
                XML encryption 2nd 3rd 4th 5th 6th 7th
        WS Security and
                message integrity validation
                security token references 2nd
                security token validation 2nd
SOAP (Simple Object Access Protocol)
        history 2nd 3rd 4th 5th 6th
SpecVersion assertion, WS Policy
SSL
        client certificates
SSL (Secure Socket Layer) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
SSL (Secure Sockets Layer) protocol 2nd 3rd
SSO (Single Sign-on Services)
super encryption
symmetric encyription

 <  Day Day Up  >    


Securing Web Services with WS-Security. Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
ISBN: 0672326515
EAN: 2147483647
Year: 2004
Pages: 119

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net