|
data transformation (in XML), 69
delete_binding, 235
delete_business, 235
delete_publisherAssertions, 235
delete_service, 235
delete_tModel, 235
description, 229, 230
DES/Triple DES (Data Encryption Standard), 90–91, 96–97
as symmetric key algorithm, 25
Triple DES, encrypting XML Element using, 96–97
Diffie-Hellman Key Agreement, 94
<DigestMethod>, 240
digital certificates. See also contracts/contract law; keys
public key infrastructure, 29–31
digital rights management. See DRM (digital rights management)
digital signatures. See also contracts/contract law; encryption; PKCS#7; S/MIME; XML Signature; UDDI (Universal Description, Discovery, and Integration)
asymmetric encryption in, 28
digital signing and key-pair system, 262–264
dispelling the myths about, 264–266
encryption of, 28–29
EU definition of, 262, 264
hierarchy of, 273–274
legal interpretations of “signature,” 265
legally neutral vs. secured, 272–273
timestamps on, 268
in UDDI, 240–241
vs. electronic signature, 28, 273
and WS-Security, 52
XML signature as, 65–66
discard_authToken, 236
discoveryURLs, 229
DNS (Domain Name System). See also PKI (Public Key Infrastructure); XKMS (XML Key Management Specification); X-KISS protocol
DNS system, (in)security of, 152
DNSSEC (Domain Name System Security), 139
DoS (Denial of Service) attacks, 36
DoS and/or spoofing (ebXML), 254
DoS/buffer overflow vulnerability (XML gateway), 290–291
against .NET servers (Microsoft IIS), 199–201
and SAML/PDP, 109–110
and two-phase request protocol (XKMS 2.0), 161–162
DRM (digital rights management), in XACML, 134
<DSAKeyValue>, 241
dsig:SignatureElement, 230
<ds:signature>, 107
DTDs (Document Type Definitions), 8–9
dynamic binding. See binding, dynamic/static
|