Flylib.com
Secure XML: The New Syntax for Signatures and Encryption
Secure XML: The New Syntax for Signatures and Encryption
ISBN: 0201756056
EAN: 2147483647
Year: 2005
Pages: 186
Authors:
Donald E. Eastlake
,
Kitty Niles
BUY ON AMAZON
Main Page
Table of content
Copyright
Preface
Notations
Acknowledgments
Part I: Introduction
Chapter 1. XML and Security
1.1 XML
1.2 The Need for Secure XML
1.3 Status of XML Security Standardization
1.4 Work in Progress
Chapter 2. Digital Cryptography Basics
2.1 Message Digests
2.2 Message Authentication Codes
2.3 Secret or Symmetric Key Ciphers
2.4 Public or Asymmetric Key Ciphers
2.5 Asymmetric Keys and Authentication
2.6 Digital Signatures
2.7 Certificates
2.8 Enveloped Encryption
2.9 Canonicalization
2.10 Randomness
2.11 Other Facets of Security
2.12 Cryptography: A Subtle Art
Part II: XML Basics
Chapter 3. The Extensible Markup Language
3.1 Related Standards and Recommendations
3.2 XML Documents
3.3 XML Document Structure
3.4 XML Document Logical Structure
3.5 XML Namespaces
3.6 XML Document Physical Structure
3.7 XML and Stylesheets
Chapter 4. XML Document Type Definitions
4.1 Introduction to DTDs
4.2 Document Type Declarations
4.3 Element Type Declarations
4.4 Defining Attributes in DTDs
4.5 Entity Reference Declarations
4.6 Notation Declarations
Chapter 5. XML Schema
5.1 Overview
5.2 Types
5.3 Elements and Attributes
5.4 Namespaces
5.5 Miscellaneous Aspects of Schemas
5.6 Parts Not Covered
Chapter 6. XPath: A Basic Building Block
6.1 Introduction to XPath
6.2 Data Model
6.3 Location Paths
6.4 Expressions
6.5 Function Library
Chapter 7. URIs, xml:base, and XPointer
7.1 URIs
7.2 xml:base
7.3 XPointer
Chapter 8. SOAP
8.1 Introduction to SOAP
8.2 SOAP Envelope, Message Exchange, and Processing Model
8.3 SOAP Encoding
8.4 SOAP Transport Binding and HTTP
8.5 SOAP Remote Procedure Call
Part III: Canonicalization and Authentication
Chapter 9. XML Canonicalization: The Key to Robustness
9.1 CanonicalizationEssential for Signatures Over XML
9.2 Canonical XML and XML Encryption
9.3 Transformative Summary
9.4 The XML Canonicalization Data Model
9.5 Formal Generative Specification
9.6 Limitations of XML Canonicalization
Chapter 10. XML Signatures and Authentication
10.1 Introduction to XML Digital Signatures
10.2 XML Signature Syntax
10.3 XML Signature Examples
10.4 Transforms and the Use of XPath
10.5 Processing Rules
10.6 Security of Signatures
Chapter 11. Profiling XMLDSIG for Applications
11.1 P3P XMLDSIG
11.2 SOAP XMLDSIG
Chapter 12. ETSI Advanced XML Signatures
12.1 Levels of XAdES Signature
12.2 XAdES Signature Syntax Basics
12.3 XAdES Signature Elements Syntax
12.4 Validation Data Syntax
Part IV: Keying
Chapter 13. The KeyInfo Element
KeyInfo Element Syntax
KeyInfo Child Elements
Private Keys
13.1 The KeyValue Element
13.2 The EncryptedKey Element
13.3 The RetrievalMethod Element
13.4 The AgreementMethod Element
13.5 The KeyName Element
13.6 The X509Data Element
13.7 The PGPData Element
13.8 The SPKIData Element
13.9 The MgmtData Element
Chapter 14. XKMS: XML Key Management
Namespaces
14.1 The Key Information Service
14.2 XKMS Common Data Elements
14.3 The Key Registration Service
14.4 XKMS Cryptographic Algorithms
14.5 Security Considerations
Part V: Encryption
Chapter 15. XML Encryption
15.1 Introduction to XML Encryption
15.2 XML Encryption Syntax
15.3 Encryption Examples
15.4 Processing Flow
15.5 Encryption Security Considerations
Chapter 16. Combining Encryption and Signature
16.1 General Considerations
16.2 The Decryption Transform
Part VI: Algorithms
Chapter 17. Overview of Algorithms
17.1 Algorithm Syntax
17.2 Algorithmic Roles
Chapter 18. Cryptographic Algorithms
18.1 Message Digests
18.2 Key Agreement Algorithms
18.3 Message Authentication Codes
18.4 Signature Algorithms
18.5 Block Encryption Algorithms
18.6 Stream Encryption Algorithms
18.7 Key Transport Algorithms
18.8 Symmetric Key Wrap Algorithms
Chapter 19. Non-cryptographic Algorithms
19.1 Canonicalization Algorithms
19.2 Transformation Algorithms
Part VII: Appendixes
Appendix A. XML Security Implementations
A.1 Apache
A.2 Baltimore Technologies
A.3 Capslock
A.4 Done Information
A.5 DSTC
A.6 Entrust
A.7 Fujitsu
A.8 GapXse
A.9 HP Web Services
A.10 IAIK
A.11 IBM
A.12 Infomosaic
A.13 JDSS II
A.14 Mather
A.15 Microsoft
A.16 NEC
A.17 Phaos Technology
A.18 Poupou
A.19 RSA Security
A.20 Siggen
A.21 Verisign
A.22 W3C
A.23 WebSig
A.24 Wedgetail
A.25 XML Sec
Appendix B. The W3C and W3C Documents
B.1 Access to W3C Documents
B.2 W3C Document Status
B.3 W3C Document Format
B.4 W3C Document Disclaimer
B.5 W3C Software Disclaimer
Appendix C. The IETF and IETF Documents
C.1 RFC Status
C.2 Access to RFCs
C.3 RFC Format
Appendix D. The NIST and NIST Documents
D.1 Access to NIST FIPS Documents
D.2 Status of NIST Documents
D.3 Format of FIPS
Appendix E. The Paper and Protocol Points of View
E.1 The Basic Points of View
E.2 Questions of Meaning
E.3 Processing Models
E.4 Security and Canonicalization
E.5 Unique Internal Labels
E.6 Examples
E.7 Resolution of the Points of View
Appendix F. SOAP Encoding Schema
References and Acronyms
Secure XML: The New Syntax for Signatures and Encryption
ISBN: 0201756056
EAN: 2147483647
Year: 2005
Pages: 186
Authors:
Donald E. Eastlake
,
Kitty Niles
BUY ON AMAZON
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
Summary
The Cisco 7905G and 7912G IP Phones
Working with Users and Names
Dial Plan Considerations
Managing Cisco IPC Express Systems by Managed Services and Enterprises
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
How PostgreSQL Organizes Data
Client 3Simple ProcessingPQexec() and PQprint()
Summary
Summary
Client 4An Interactive Query Processor
PMP Practice Questions Exam Cram 2
Answers and Explanations
Exam Prep Questions
Answers and Explanations
Exam Prep Questions
Project Closing
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Using DMAIC to Improve Speed, Quality, and Cost
Working with Ideas
Variation Analysis
Reducing Lead Time and Non-Value-Add Cost
Complexity Value Stream Mapping and Complexity Analysis
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
LAN Basics
Wide Area Networking
Next-Generation Networks
Beyond 3G
Mobile TV
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Introduction to Probability and Statistics for Projects
Making Quantitative Decisions
Expense Accounting and Earned Value
Special Topics in Quantitative Management
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies