index_R

 <  Day Day Up  >    

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y]

Reference element (XML Signature) 2nd 3rd 4th 5th 6th
        SignatureMethod element 2nd 3rd 4th
referencing
        security tokens 2nd 3rd 4th 5th
                XML signatures and 2nd 3rd
remote applications
        SOAP and 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
rights management
RMI (Remote Method Invocation)
role-based security
        JWS
        WebLogic Workshop
root CAs 2nd 3rd
RosettaNet 2nd
RPC-style SOAP bodies
RSA cryptography 2nd 3rd 4th 5th
        decryption
        encryption
        key pairs 2nd
        padding 2nd

 <  Day Day Up  >    


Securing Web Services with WS-Security. Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
ISBN: 0672326515
EAN: 2147483647
Year: 2004
Pages: 119

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net