index_X

 <  Day Day Up  >    

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y]

X-KISS 2nd 3rd 4th 5th
X-KISS (XML Key Information Service Specification)
X-KRSS 2nd 3rd 4th 5th
X-KRSS (XML Key Registration Service Specification)
X.509 standard
X.509 V3 certificate
        BinarySecurityToken and 2nd 3rd 4th
XACML
        data model 2nd
        layers 2nd 3rd
        policies 2nd 3rd 4th
XACML (extensible Access Control Markup Language) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
XCBF (XML Common Biometric Format)
        security tokens
XKMS
        goals 2nd
        history
        services 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
XKMS (XML Key Management Specification) 2nd 3rd
XML
        digital signatures 2nd 3rd
       Encryption
                block cipher processing 2nd
       encryption
                WebLogic Workshop
        introduction
        namespaces 2nd 3rd 4th 5th 6th 7th
        security and 2nd 3rd 4th 5th 6th 7th
        security tokens
                SAML 2nd 3rd 4th 5th 6th 7th
                XCBF
                XrML 2nd 3rd 4th
        Web services and 2nd
XML (extensible Markup Language)
        history 2nd
XML Decryption Transform 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
XML Encryption 2nd
        AgreementMethod element 2nd 3rd
XML encryption
        attachments 2nd 3rd 4th 5th
XML Encryption
        block cipher padding 2nd
       block cipher processing
                feedback 2nd
        CarriedKeyName element 2nd
        CipherData element 2nd
        EncryptedData element 2nd
        EncryptedData schema 2nd 3rd 4th
        EncryptedKey element 2nd 3rd 4th
        EncryptedMethod element 2nd
        EncryptedType element
        EncryptionProperties element 2nd 3rd
        goals
        KeyInfo element 2nd 3rd
        overview 2nd 3rd
        processes 2nd 3rd 4th 5th
XML encryption
        shared key 2nd 3rd
XML Encryption
        shared key encryption and
XML encryption
        wrapped key 2nd 3rd 4th 5th
XML Encryption
       XML Signature
                using together 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd
        XML Signature and 2nd 3rd
XML Schema 2nd 3rd
        introduction
        SAML assertions
        WSDL and
XML Signature 2nd 3rd 4th
        CanoncalizationMethod element
        Detached Signatures
       DTDs
                entity references 2nd 3rd
        generation 2nd 3rd
        integrity and
        keys
        non- repudiation
       Object elements
                signing
        overview 2nd
        Reference element 2nd
        security model
        shorthand schema
        Signature element 2nd 3rd 4th 5th
                CanonicalizationMethod element 2nd 3rd 4th 5th 6th 7th 8th
                DigestMethod element
                DigestValue element
                KeyInfo element 2nd 3rd 4th 5th 6th 7th 8th
                Object element 2nd 3rd 4th 5th 6th
                Reference element 2nd 3rd 4th
                SignatureMethod element 2nd
                SignatureValue element
                Transform element 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
        SignatureMethod element
        SignedInfo element
        structure 2nd
        transforms 2nd
        URI/URL variants
        validation 2nd 3rd
        W3C standard
        XML Decryption Transform 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
       XML Encryption
                using together 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd
        XML Encryption and 2nd 3rd
XML signatures
        message integrity validation
        security token references 2nd 3rd
        security token validation 2nd
XML Signatures
        WebLogic Workshop
XML signatures
        WS Security example
        WS Security and 2nd
        WS Security example 2nd
XML Transformations 2nd 3rd 4th 5th 6th
        XMLBeans
        XPath
        XQuery 2nd 3rd
        XSLT 2nd
XMLBeans
XPath
XPath Filter 2.0 Transform 2nd
XPath Filtering Transform (XML) 2nd
XQuery 2nd 3rd
XrML
        data model 2nd
XrML (extensible Rights Markup Language) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
        security tokens 2nd 3rd 4th
XSLT (Extensible Stylesheet Language Transformations) 2nd
XSLT Transform

 <  Day Day Up  >    


Securing Web Services with WS-Security. Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
ISBN: 0672326515
EAN: 2147483647
Year: 2004
Pages: 119

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net