Flylib.com
Web Services Security
Web Services Security
ISBN: 0072224711
EAN: 2147483647
Year: 2003
Pages: 105
Authors:
Mark ONeill
BUY ON AMAZON
Table of Contents
BackCover
Web Services Security
Foreword
Part I: Introduction
Introduction
Chapter 1: Presenting Web Services
Defining Web Services
Introducing the XML Family
XML for Communication
An Example Web Services Scenario
Practical Tools
Chapter 2: Presenting Security
The Building Blocks of Security
Peeling Back the Layers of Security
Chapter 3: New Challenges and New Threats
Web Services Security Challenges
Meeting the Challenges: New Technologies for Web Services Security
Web Services Security Threats
Part II: XML Security
Chapter 4: XML Signature
Making Sense of XML Signature
Uses of XML Signature for Web Services Security
Creating and Validating an XML Signature
Checklist
Chapter 5: XML Encryption
Introduction to XML Encryption
Encryption Scenarios
Encryption Steps
Decryption Steps
Code Examples
The Overlap with XML Signature
Checklist
Chapter 6: SAML
Deploying SAML
Checklist
Chapter 7: XACML
Introduction to XACML
Rules In Xacml
Chapter 8: XML Key Management Specification (XKMS)
XKMS and PKI
The XKMS Protocol
XML Key Information Service Specification
Advanced Protocol Features of XKMS 2.0
Checklist
Part III: Security in SOAP: Presenting WS-Security
Chapter 9: WS-Security
Introduction to WS-Security
SAML and WS-Security
Checklist
Part IV: Security in Web Services Frameworks
Chapter 10: .NET and Passport
Ticket, Please: A Kerberos Overview
Passport
Web Services and .NET
Checklist
Chapter 11: The Liberty Alliance Project
Chapter 12: UDDI and Security
Securing Transactions with the UDDI Services
Checklist
Part V: Conclusion
Chapter 13: ebXML
ebXML Security Overview
ebXML Registry Security
ebXML Message Security
Standards Overview
ebXML Standards Overview
Message Security Conclusions
Chapter 14: Legal Considerations
The Role of Contract Law and Evidence in Online Security
Applying the Law to Particular Technologies
Conclusions
Checklist
Appendix: Case Studies
Foreign Exchange Transactions
XML Gateway Rollout
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_139
List of Figures
List of Tables
List of Code Examples
List of Sidebars
Web Services Security
ISBN: 0072224711
EAN: 2147483647
Year: 2003
Pages: 105
Authors:
Mark ONeill
BUY ON AMAZON
Beginning Cryptography with Java
Message Digests, MACs, and HMACs
Asymmetric Key Cryptography
Distinguished Names and Certificates
CMS and S/MIME
Appendix B Algorithms Provided by the Bouncy Castle Provider
Metrics and Models in Software Quality Engineering (2nd Edition)
Quality: Popular Views
The Cleanroom Methodology
Product Quality Metrics
A Proposed Software Project Assessment Method
Measuring Process Improvements at Activity Levels
Software Configuration Management
Configuration Status Accounting
Configuration Management and Data Management
Appendix C Sample Data Dictionary
Appendix L Software Requirements Changes
Appendix M Problem Report (PR)
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 3. Navigate the World in Your Web Browser
Hack 25. Track Your UPS Packages
Hacks 5161: Introduction
Hack 52. Put a Map and HTML into Your Info Windows
Hack 58. Find the Right Zoom Level
.NET System Management Services
Using the System.Management Namespace
Querying WMI
Handling WMI Events
The WMI Schema
WMI Security
FileMaker 8 Functions and Scripts Desk Reference
Factorial()
FieldNames()
FV()
Length()
ValueListNames()
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies