Flylib.com
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
ISBN: 0672326515
EAN: 2147483647
Year: 2004
Pages: 119
Authors:
Jothy Rosenberg
,
David Remy
BUY ON AMAZON
Securing Web Services with WS-Security
Table of Contents
Copyright
About the Authors
Acknowledgments
We Want to Hear from You
Forewords
Securing Web Services to Deliver on Their Promise
Building the Foundation for Agile Computing
Introduction
Who This Book Is For
About This Book
How This Book Is Organized
Chapter 1. Basic Concepts of Web Services Security
Web Services Basics: XML, SOAP, and WSDL
Application Integration
Security Basics
Web Services Security Basics
Summary
Chapter 2. The Foundations of Web Services
The Gestalt of Web Services
XML: Meta-Language for Data-Oriented Interchange
SOAP: XML Messaging and Remote Application Access
WSDL: Schema for XMLSOAP Objects and Interfaces
UDDI: Publishing and Discovering Web Services
ebXML and RosettaNet: Alternative Technologies for Web Services
The Web Services Security Specifications
Summary
Chapter 3. The Foundations of Distributed Message-Level Security
The Challenges of Information Security for Web Services
Shared Key Technologies
Public Key Technologies
Summary
Chapter 4. Safeguarding the Identity and Integrity of XML Messages
Introduction To and Motivation for XML Signature
XML Signature Fundamentals
XML Signature Structure
XML Signature Processing
The XML Signature Elements
Security Strategies for XML Signature
Summary
Chapter 5. Ensuring Confidentiality of XML Messages
Introduction to and Motivation for XML Encryption
XML Encryption Fundamentals
XML Encryption Structure
XML Encryption Processing
Using XML Encryption and XML Signature Together
Summary
Chapter 6. Portable Identity, Authentication, and Authorization
Introduction to and Motivation for SAML
How SAML Works
Using SAML with WS-Security
Applying SAML: Project Liberty
Summary
Chapter 7. Building Security into SOAP
Introduction to and Motivation for WS-Security
Extending SOAP with Security
Security Tokens in WS-Security
Providing Confidentiality: XML Encryption in WS-Security
Providing Integrity: XML Signature in WS-Security
Message Time Stamps
Summary
Chapter 8. Communicating Security Policy
WS-Policy
The WS-Policy Framework
WS-SecurityPolicy
Summary
Chapter 9. Trust, Access Control, and Rights for Web Services
The WS- Family of Security Specifications
XML Key Management Specification (XKMS)
eXtensible Access Control Markup Language (XACML) Specification
eXtensible Rights Markup Language (XrML) Management Specification
Summary
Chapter 10. Building a Secure Web Service Using BEA s WebLogic Workshop
Security Layer Walkthrough
WebLogic Workshop Web Service Walkthrough
Summary
Appendix A. Security, Cryptography, and Protocol Background Material
The SSL Protocol
Testing for Primality
RSA Cryptography
DSA Digital Signature Algorithms
Block Cipher Processing
DES Encryption Algorithm
AES Encryption Algorithm
Hashing Details and Requirements
SHA1
Silvio Micali s Fast ValidationRevocation
Canonicalization of Messages for Digital Signature Manifests
Base-64 Encoding
PGP
Glossary
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_R
index_S
index_T
index_U
index_V
index_W
index_X
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
ISBN: 0672326515
EAN: 2147483647
Year: 2004
Pages: 119
Authors:
Jothy Rosenberg
,
David Remy
BUY ON AMAZON
Beginning Cryptography with Java
The JCA and the JCE
Symmetric Key Cryptography
Message Digests, MACs, and HMACs
Distinguished Names and Certificates
CMS and S/MIME
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
Summary
The Cisco 7902G IP Phone
Cisco IOS PSTN Telephony Interfaces
DTMF Relay for H.323
Table vm_message
Java for RPG Programmers, 2nd Edition
Structured Operations And Statements
Arrays And Vectors
String Manipulation
An Object Orientation
More Java
Data Structures and Algorithms in Java
Software Development
Vocabulary
The List Interface
Insertion Sort
Summary
An Introduction to Design Patterns in C++ with Qt 4
Managed Containers, Composites, and Aggregates
DataObject: An Extension of QObject
Memory Access
Inheritance in Detail
Persistent Settings
VBScript in a Nutshell, 2nd Edition
Reusable Code Libraries
How ASP Works
Accessing Other Object Models
Section A.13. Object Programming
Section C.4. Logical and Bitwise Operators
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies