index_C

 <  Day Day Up  >    

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y]

CanoncalizationMethod element (XML Signature)
canonicalization 2nd 3rd 4th 5th 6th
CanonicalizationMethod element (XML Signature) 2nd 3rd 4th 5th 6th 7th 8th
CarriedKeyName element (XML Encryption) 2nd
CAs
        certificate chain
        certificate issuance 2nd 3rd 4th 5th 6th
        revocation 2nd 3rd
        root CAs 2nd 3rd
CAs (certificates of authority) 2nd 3rd
CDP (certificate deployment point)
certificate path validation
CipherData element (XML Encryption) 2nd
ciphertext
        cryptography
collision resistance
        SHA-1 2nd
COM (Component Object Model)
confidentiality
Confidentiality assertion, WS SecurityPolicy 2nd 3rd 4th 5th
CORBA (Common Object Request Broker Architecture)
credentials
CRL (certificate revocation list) 2nd 3rd 4th 5th
cryptography 2nd 3rd 4th
        ciphertext
        integrity
        plaintext
        public key 2nd
        RSA cryptography 2nd 3rd 4th 5th
        shared key

 <  Day Day Up  >    


Securing Web Services with WS-Security. Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
ISBN: 0672326515
EAN: 2147483647
Year: 2004
Pages: 119

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net