index_T

 <  Day Day Up  >    

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y]

testing
        numbers for primality 2nd 3rd 4th 5th
TextEncoding assertion, WS Policy
tickets
        Kerberos tokens
time stamps
        SOAP messages 2nd 3rd 4th 5th
TLS (Transport Layer Security) 2nd 3rd 4th 5th 6th 7th 8th 9th
tModels (UDDI)
tokens
        Kerberos
                tokens
        WebLogic Workshop 2nd
Transform element (XML Signature) 2nd 3rd
        Base-64 transform
        canonicalization transform
        Enveloped Signature Transform 2nd
        XPath Filter 2.0 Transform 2nd
        XPath Filtering Transform 2nd
        XSLT Transform
transforms
       XML Signature
                usage 2nd
transport security
        SOAP message security and 2nd 3rd 4th 5th 6th 7th 8th 9th
transport-level security
       WebLogic Workshop
                Web services 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th
transport-level security, WebLogic Workshop and 2nd
triange, security
trust assertions, SAML 2nd
trust relationships
        Security Token Services
        WS Privacy and 2nd 3rd
        WS Trust and 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
trust services
        ACS
        billing services 2nd 3rd
        built-in security
        DSS
        metering services 2nd 3rd
        SSO
        XKMS

 <  Day Day Up  >    


Securing Web Services with WS-Security. Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
ISBN: 0672326515
EAN: 2147483647
Year: 2004
Pages: 119

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net