|
backdoors, 24
bank, merchant
foreign exchange case study, 287–290
B2B (Business-To-Business)
encryption, importance of, 23
SOAP implementation in, 11–12
B2C (Business-To-Consumer)
B2C Internet, reciprocal authentication problems with, 38
and CGI applications, 11
binding, dynamic/static. See also keys; XKMS (XML Key Management Specification); X-KRSS (XML Key Registration Service Specification)
bindingTemplates, 230
bindingTemplates, (UDDI), 230
delete_binding, (UDDI), 235
key binding, XKMS-defined elements of, 144
key binding association (in XKMS), 143–145
key binding revocation (X-KRSS revoke operation), 158–159
key binding updating (X-KRSS reissue operation), 158
Keybinding Element, members of (in XKMS), 145
locate request, QueryKeyBinding in (X-KISS protocol), 147
save_binding, (UDDI), 235
SOA, discovery and binding in, 5
XKMS, key binding in, 143–145
biometrics, 278–279
defeating, 279
in single sign-in, 34
businessKey, 229, 230
businessServices, 229
|