Flylib.com
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
ISBN: 0672326515
EAN: 2147483647
Year: 2004
Pages: 119
Authors:
Jothy Rosenberg
,
David Remy
BUY ON AMAZON
Securing Web Services with WS-Security
Table of Contents
Copyright
About the Authors
Acknowledgments
We Want to Hear from You
Forewords
Securing Web Services to Deliver on Their Promise
Building the Foundation for Agile Computing
Introduction
Who This Book Is For
About This Book
How This Book Is Organized
Chapter 1. Basic Concepts of Web Services Security
Web Services Basics: XML, SOAP, and WSDL
Application Integration
Security Basics
Web Services Security Basics
Summary
Chapter 2. The Foundations of Web Services
The Gestalt of Web Services
XML: Meta-Language for Data-Oriented Interchange
SOAP: XML Messaging and Remote Application Access
WSDL: Schema for XMLSOAP Objects and Interfaces
UDDI: Publishing and Discovering Web Services
ebXML and RosettaNet: Alternative Technologies for Web Services
The Web Services Security Specifications
Summary
Chapter 3. The Foundations of Distributed Message-Level Security
The Challenges of Information Security for Web Services
Shared Key Technologies
Public Key Technologies
Summary
Chapter 4. Safeguarding the Identity and Integrity of XML Messages
Introduction To and Motivation for XML Signature
XML Signature Fundamentals
XML Signature Structure
XML Signature Processing
The XML Signature Elements
Security Strategies for XML Signature
Summary
Chapter 5. Ensuring Confidentiality of XML Messages
Introduction to and Motivation for XML Encryption
XML Encryption Fundamentals
XML Encryption Structure
XML Encryption Processing
Using XML Encryption and XML Signature Together
Summary
Chapter 6. Portable Identity, Authentication, and Authorization
Introduction to and Motivation for SAML
How SAML Works
Using SAML with WS-Security
Applying SAML: Project Liberty
Summary
Chapter 7. Building Security into SOAP
Introduction to and Motivation for WS-Security
Extending SOAP with Security
Security Tokens in WS-Security
Providing Confidentiality: XML Encryption in WS-Security
Providing Integrity: XML Signature in WS-Security
Message Time Stamps
Summary
Chapter 8. Communicating Security Policy
WS-Policy
The WS-Policy Framework
WS-SecurityPolicy
Summary
Chapter 9. Trust, Access Control, and Rights for Web Services
The WS- Family of Security Specifications
XML Key Management Specification (XKMS)
eXtensible Access Control Markup Language (XACML) Specification
eXtensible Rights Markup Language (XrML) Management Specification
Summary
Chapter 10. Building a Secure Web Service Using BEA s WebLogic Workshop
Security Layer Walkthrough
WebLogic Workshop Web Service Walkthrough
Summary
Appendix A. Security, Cryptography, and Protocol Background Material
The SSL Protocol
Testing for Primality
RSA Cryptography
DSA Digital Signature Algorithms
Block Cipher Processing
DES Encryption Algorithm
AES Encryption Algorithm
Hashing Details and Requirements
SHA1
Silvio Micali s Fast ValidationRevocation
Canonicalization of Messages for Digital Signature Manifests
Base-64 Encoding
PGP
Glossary
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_R
index_S
index_T
index_U
index_V
index_W
index_X
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
ISBN: 0672326515
EAN: 2147483647
Year: 2004
Pages: 119
Authors:
Jothy Rosenberg
,
David Remy
BUY ON AMAZON
Metrics and Models in Software Quality Engineering (2nd Edition)
Quality: Professional Views
The Object-Oriented Development Process
Reliability and Validity
A Closer Look at Defect Removal Effectiveness
1 Definition and Measurements of System Availability
The .NET Developers Guide to Directory Services Programming
Building LDAP Filters
Reading Security Descriptors with Security Masks
Choosing an Object Class
The Standard Method
Appendix B. LDAP Tools for Programmers
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
3-D Layers from Photoshop Layers
Blue-Screen Garbage Mattes
Matte and Keying Plug-ins
Making Movies from Stills
Scale and Speed
What is Lean Six Sigma
Key #2: Improve Your Processes
Key #4: Base Decisions on Data and Facts
Making Improvements That Last: An Illustrated Guide to DMAIC and the Lean Six Sigma Toolkit
The Experience of Making Improvements: What Its Like to Work on Lean Six Sigma Projects
Six Things Managers Must Do: How to Support Lean Six Sigma
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Introduction to Probability and Statistics for Projects
Expense Accounting and Earned Value
Quantitative Time Management
Special Topics in Quantitative Management
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
XML
Windows Services
ADO.NET
Web Services
Remoting and Enterprise Services
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies