Flylib.com
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
ISBN: 0672326515
EAN: 2147483647
Year: 2004
Pages: 119
Authors:
Jothy Rosenberg
,
David Remy
BUY ON AMAZON
Securing Web Services with WS-Security
Table of Contents
Copyright
About the Authors
Acknowledgments
We Want to Hear from You
Forewords
Securing Web Services to Deliver on Their Promise
Building the Foundation for Agile Computing
Introduction
Who This Book Is For
About This Book
How This Book Is Organized
Chapter 1. Basic Concepts of Web Services Security
Web Services Basics: XML, SOAP, and WSDL
Application Integration
Security Basics
Web Services Security Basics
Summary
Chapter 2. The Foundations of Web Services
The Gestalt of Web Services
XML: Meta-Language for Data-Oriented Interchange
SOAP: XML Messaging and Remote Application Access
WSDL: Schema for XMLSOAP Objects and Interfaces
UDDI: Publishing and Discovering Web Services
ebXML and RosettaNet: Alternative Technologies for Web Services
The Web Services Security Specifications
Summary
Chapter 3. The Foundations of Distributed Message-Level Security
The Challenges of Information Security for Web Services
Shared Key Technologies
Public Key Technologies
Summary
Chapter 4. Safeguarding the Identity and Integrity of XML Messages
Introduction To and Motivation for XML Signature
XML Signature Fundamentals
XML Signature Structure
XML Signature Processing
The XML Signature Elements
Security Strategies for XML Signature
Summary
Chapter 5. Ensuring Confidentiality of XML Messages
Introduction to and Motivation for XML Encryption
XML Encryption Fundamentals
XML Encryption Structure
XML Encryption Processing
Using XML Encryption and XML Signature Together
Summary
Chapter 6. Portable Identity, Authentication, and Authorization
Introduction to and Motivation for SAML
How SAML Works
Using SAML with WS-Security
Applying SAML: Project Liberty
Summary
Chapter 7. Building Security into SOAP
Introduction to and Motivation for WS-Security
Extending SOAP with Security
Security Tokens in WS-Security
Providing Confidentiality: XML Encryption in WS-Security
Providing Integrity: XML Signature in WS-Security
Message Time Stamps
Summary
Chapter 8. Communicating Security Policy
WS-Policy
The WS-Policy Framework
WS-SecurityPolicy
Summary
Chapter 9. Trust, Access Control, and Rights for Web Services
The WS- Family of Security Specifications
XML Key Management Specification (XKMS)
eXtensible Access Control Markup Language (XACML) Specification
eXtensible Rights Markup Language (XrML) Management Specification
Summary
Chapter 10. Building a Secure Web Service Using BEA s WebLogic Workshop
Security Layer Walkthrough
WebLogic Workshop Web Service Walkthrough
Summary
Appendix A. Security, Cryptography, and Protocol Background Material
The SSL Protocol
Testing for Primality
RSA Cryptography
DSA Digital Signature Algorithms
Block Cipher Processing
DES Encryption Algorithm
AES Encryption Algorithm
Hashing Details and Requirements
SHA1
Silvio Micali s Fast ValidationRevocation
Canonicalization of Messages for Digital Signature Manifests
Base-64 Encoding
PGP
Glossary
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_R
index_S
index_T
index_U
index_V
index_W
index_X
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
ISBN: 0672326515
EAN: 2147483647
Year: 2004
Pages: 119
Authors:
Jothy Rosenberg
,
David Remy
BUY ON AMAZON
Beginning Cryptography with Java
Asymmetric Key Cryptography
Key and Certificate Management Using Keystores
SSL and TLS
Appendix B Algorithms Provided by the Bouncy Castle Provider
Appendix C Using the Bouncy Castle API for Elliptic Curve
VBScript Programmers Reference
Classes in VBScript (Writing Your Own COM Objects)
HTML Applications
Appendix C Coding Convention
Appendix D Visual Basic Constants Supported in VBScript
Appendix H Regular Expressions
Building Web Applications with UML (2nd Edition)
Role of Modeling
Security
Summary
Analysis Model Collaborations
Sample Screen Shots
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 13. Add Maps to Excel Spreadsheets with MapPoint
Hack 18. Why You Cant Watch Broadcast TV
Hack 43. Map Earthquakes in (Nearly) Real Time
Hack 96. Share Geo-Photos on the Web
Hack 99. Map Your Friend-of-a-Friend Network
The Oracle Hackers Handbook: Hacking and Defending Oracle
Attacking the TNS Listener and Dispatchers
Oracle and PL/SQL
Attacking Oracle PL/SQL Web Applications
Accessing the File System
Appendix A Default Usernames and Passwords
Java All-In-One Desk Reference For Dummies
Using Eclipse
Working with Numbers and Expressions
Making Your Own Classes
Book IV - Strings, Arrays, and Collections
Using Regular Expressions
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies