< Day Day Up > |
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] SAML 2nd addresses problems with 2nd 3rd 4th assertions attribute 2nd authorizatin 2nd elements 2nd XML Schema attribute assertions attribute requests 2nd authentication assertions 2nd 3rd 4th 5th 6th authentication context 2nd 3rd authentication requests 2nd authorization assertions authorization requests 2nd 3rd 4th 5th bindings Microsoft Passport and 2nd 3rd overview 2nd 3rd 4th 5th 6th 7th PDP PEP portable trust and profiles 2nd 3rd Project Liberty WS Security and WS Security and 2nd Project Liberty digital identities 2nd 3rd federated identities profiles uses 2nd 3rd 4th protocols 2nd 3rd 4th 5th 6th responses 2nd PRP security tokens 2nd 3rd 4th 5th 6th 7th trust assertions 2nd WS Federation and SAML (Security Assertion Markup Language) SAML bindings 2nd 3rd 4th secret key encryption security authentication 2nd 3rd authorization 2nd 3rd built-in trust services and confidentiality cryptography public key 2nd shared key integrity 2nd keys message-based WebLogic Workshop Web services 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th message-level WebLogic Workshop 2nd 3rd 4th non- repudiation 2nd 3rd overview 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th role-based JWS and WebLogic Workshop SHA-1 SOAP and tokens transport-level WebLogic Workshop and 2nd WebLogic Workshop Web services 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th Web Services issues 2nd 3rd WebLogic Security Framework WSDL and XML and 2nd 3rd 4th 5th 6th 7th XML Signature keys security model security context establishment security specifications 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th Security Token Services trust and security tokens referencing 2nd 3rd 4th 5th SOAP 2nd 3rd 4th 5th WS Security 2nd 3rd BinarySecurityToken referencing XML tokens 2nd 3rd 4th WS Security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th BinarySecurityToken 2nd 3rd 4th 5th 6th referencing 2nd 3rd 4th 5th 6th 7th 8th UsernameToken 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th validation 2nd XML tokens 2nd 3rd 4th 5th 6th 7th 8th 9th XML SAML 2nd 3rd 4th 5th 6th 7th XCBF XrML 2nd 3rd 4th SecurityHeader assertion, WS SecurityPolicy 2nd SecurityToken assertion, WS SecurityPolicy 2nd 3rd 4th 5th 6th 7th service-oriented architectures session keys SGML (Standard Generalized Markup Language) SHA-1 security SHA-1 (Secure Hash Algorithm 1) SHA-1 (Secure Hash Algorithms) collision resistance 2nd shared authentication shared key public key comparison shared key cryptography shared key encryption 2nd 3rd 4th 5th block ciphers XML 2nd 3rd XML Encryption and shared key technologies Kerberos 2nd 3rd limitations shared key technology cryptography 2nd 3rd shared keys Kerberos shared technologies encryption 2nd 3rd 4th 5th Signature element (XML Signature) 2nd 3rd 4th 5th CanonicalizationMethod element 2nd 3rd 4th 5th 6th 7th 8th DigestMethod element DigestValue element KeyInfo element 2nd 3rd 4th 5th 6th 7th KeyName element KeyValue element PGPData element Retrieval element SPKIData element X509Data element Object element 2nd 3rd 4th Manifest element SignatureProperties element SignatureMethod element 2nd SignatureValue element Transform element 2nd 3rd Base-64 transform canonicalization transform Enveloped Signature Transform 2nd XPath Filter 2.0 Transform 2nd XPath Filtering Transform 2nd XSLT Transform SignatureMethod element (XML Signature) 2nd 3rd SignatureProperties element (XML Signature) signatures DSA Signatures 2nd 3rd 4th hash functions 2nd SignatureValue element (XML Signature) SignedInfo element (XML Signature) signing digital signatures and Silvio Micali, validation/revocation 2nd 3rd 4th 5th SOA (service-oriented architecture) SOAP attachments 2nd body 2nd 3rd RPC-style envelope extending with security 2nd 3rd 4th 5th header headers 2nd introduction 2nd 3rd message security transport level security and 2nd 3rd 4th 5th 6th 7th 8th 9th messages time stamps 2nd 3rd 4th 5th processors remote applications and 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th security and security tokens 2nd 3rd 4th 5th WS Security encrypted attachments WS Security and security token references WSDL and 2nd WS SecureConversation and 2nd 3rd 4th 5th 6th 7th 8th 9th WS Security encrypted attachments 2nd 3rd headers XML encryption 2nd 3rd 4th 5th 6th 7th WS Security and message integrity validation security token references 2nd security token validation 2nd SOAP (Simple Object Access Protocol) history 2nd 3rd 4th 5th 6th SpecVersion assertion, WS Policy SSL client certificates SSL (Secure Socket Layer) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th SSL (Secure Sockets Layer) protocol 2nd 3rd SSO (Single Sign-on Services) super encryption symmetric encyription |
< Day Day Up > |