index_W

 <  Day Day Up  >    

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y]

W3C
        XML Signature and
Web
        forms
        protocols
Web services
        definition
        inevitability
        overview
Web Services
        security issues 2nd 3rd
Web services
        specifications 2nd 3rd 4th
       WebLogic Workshop
                overview 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th
                views 2nd 3rd
        XML and 2nd
WebLog Workshop
       Web services
                message-based security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th
WebLogic Security Framework
WebLogic Workshop
        encryption
        message-level security 2nd 3rd 4th
        overview 2nd 3rd 4th 5th 6th 7th 8th 9th
        role-based security
        tokens 2nd
        transport-level security 2nd
       Web services
                overview 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th
                transport-level security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th
                views 2nd 3rd
        WS-Security configuration
        XML Signatures
WebLogic Workshop IDE
white pages (UDDI)
WIDL (Web Interface Definition Language)
wrapped key encryption
        XML 2nd 3rd 4th 5th
WS Security
        security tokens 2nd 3rd
                BinarySecurityToken
                referencing
                XML tokens 2nd 3rd 4th
       XML encryption
                attachments
        XML signatures example
WS-Policy
        trust issues
WS-Security 2nd
        goals 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
        WebLogic Workshop configuration
WSDL
       documents
                LESSdefinitions tag
        history 2nd 3rd 4th
        introduction 2nd
        LESSbinding tag
        LESSmessage tag
        LESSportType tag
        LESSservice tag
        ports
        security and
        SOAP and 2nd
        WS Policy and 2nd 3rd 4th 5th 6th
        XML Schema and
WSDL (Web Services Description Language)
        WS Policy and 2nd
WSS (Web Services Security)
WS Authorization 2nd
WS Federation 2nd 3rd 4th 5th 6th 7th
WS Policy 2nd
        Arbitrary Resource Attachment
        assertions
                Language
                MessagePredicate
                SpecVersion
                TextEncoding
        framework 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th
                WS PolicyAssertions 2nd 3rd
                WS PolicyAttachment 2nd 3rd
        interoperability and 2nd
        WSDL and 2nd 3rd 4th 5th 6th 7th 8th
        WS Security and 2nd 3rd 4th
WS PolicyAssertions 2nd 3rd
WS PolicyAttachment 2nd 3rd
WS Privacy 2nd 3rd 4th
WS SecureConversation 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
WS Security
        as foundational technology
       message integrity
                validation
        namespaces
        origins
        security tokens 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th
                BinarySecurityToken 2nd 3rd 4th 5th 6th
                referencing 2nd 3rd 4th 5th 6th 7th 8th
                UsernameToken 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
                validation 2nd
                XML tokens 2nd 3rd 4th 5th 6th 7th 8th 9th
       SOAP
                security headers
        SOAP and
        WS Policy and 2nd 3rd 4th
        XML encryption 2nd 3rd 4th 5th 6th 7th 8th
                attachments 2nd 3rd 4th
        XML signatures and 2nd
        XML signatures example 2nd
WS SecurityPolicy
        Confidentiality assertion 2nd 3rd 4th 5th
        Integrity assertion 2nd 3rd 4th 5th 6th
        MessageAge assertion 2nd
        SecurityHeader assertion 2nd
        SecurityToken assertion 2nd 3rd 4th 5th 6th 7th
        Visibility assertion 2nd
WS Trust 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

 <  Day Day Up  >    


Securing Web Services with WS-Security. Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
ISBN: 0672326515
EAN: 2147483647
Year: 2004
Pages: 119

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net