Flylib.com
Secure XML: The New Syntax for Signatures and Encryption
Secure XML: The New Syntax for Signatures and Encryption
ISBN: 0201756056
EAN: 2147483647
Year: 2005
Pages: 186
Authors:
Donald E. Eastlake
,
Kitty Niles
BUY ON AMAZON
Main Page
Table of content
Copyright
Preface
Notations
Acknowledgments
Part I: Introduction
Chapter 1. XML and Security
1.1 XML
1.2 The Need for Secure XML
1.3 Status of XML Security Standardization
1.4 Work in Progress
Chapter 2. Digital Cryptography Basics
2.1 Message Digests
2.2 Message Authentication Codes
2.3 Secret or Symmetric Key Ciphers
2.4 Public or Asymmetric Key Ciphers
2.5 Asymmetric Keys and Authentication
2.6 Digital Signatures
2.7 Certificates
2.8 Enveloped Encryption
2.9 Canonicalization
2.10 Randomness
2.11 Other Facets of Security
2.12 Cryptography: A Subtle Art
Part II: XML Basics
Chapter 3. The Extensible Markup Language
3.1 Related Standards and Recommendations
3.2 XML Documents
3.3 XML Document Structure
3.4 XML Document Logical Structure
3.5 XML Namespaces
3.6 XML Document Physical Structure
3.7 XML and Stylesheets
Chapter 4. XML Document Type Definitions
4.1 Introduction to DTDs
4.2 Document Type Declarations
4.3 Element Type Declarations
4.4 Defining Attributes in DTDs
4.5 Entity Reference Declarations
4.6 Notation Declarations
Chapter 5. XML Schema
5.1 Overview
5.2 Types
5.3 Elements and Attributes
5.4 Namespaces
5.5 Miscellaneous Aspects of Schemas
5.6 Parts Not Covered
Chapter 6. XPath: A Basic Building Block
6.1 Introduction to XPath
6.2 Data Model
6.3 Location Paths
6.4 Expressions
6.5 Function Library
Chapter 7. URIs, xml:base, and XPointer
7.1 URIs
7.2 xml:base
7.3 XPointer
Chapter 8. SOAP
8.1 Introduction to SOAP
8.2 SOAP Envelope, Message Exchange, and Processing Model
8.3 SOAP Encoding
8.4 SOAP Transport Binding and HTTP
8.5 SOAP Remote Procedure Call
Part III: Canonicalization and Authentication
Chapter 9. XML Canonicalization: The Key to Robustness
9.1 CanonicalizationEssential for Signatures Over XML
9.2 Canonical XML and XML Encryption
9.3 Transformative Summary
9.4 The XML Canonicalization Data Model
9.5 Formal Generative Specification
9.6 Limitations of XML Canonicalization
Chapter 10. XML Signatures and Authentication
10.1 Introduction to XML Digital Signatures
10.2 XML Signature Syntax
10.3 XML Signature Examples
10.4 Transforms and the Use of XPath
10.5 Processing Rules
10.6 Security of Signatures
Chapter 11. Profiling XMLDSIG for Applications
11.1 P3P XMLDSIG
11.2 SOAP XMLDSIG
Chapter 12. ETSI Advanced XML Signatures
12.1 Levels of XAdES Signature
12.2 XAdES Signature Syntax Basics
12.3 XAdES Signature Elements Syntax
12.4 Validation Data Syntax
Part IV: Keying
Chapter 13. The KeyInfo Element
KeyInfo Element Syntax
KeyInfo Child Elements
Private Keys
13.1 The KeyValue Element
13.2 The EncryptedKey Element
13.3 The RetrievalMethod Element
13.4 The AgreementMethod Element
13.5 The KeyName Element
13.6 The X509Data Element
13.7 The PGPData Element
13.8 The SPKIData Element
13.9 The MgmtData Element
Chapter 14. XKMS: XML Key Management
Namespaces
14.1 The Key Information Service
14.2 XKMS Common Data Elements
14.3 The Key Registration Service
14.4 XKMS Cryptographic Algorithms
14.5 Security Considerations
Part V: Encryption
Chapter 15. XML Encryption
15.1 Introduction to XML Encryption
15.2 XML Encryption Syntax
15.3 Encryption Examples
15.4 Processing Flow
15.5 Encryption Security Considerations
Chapter 16. Combining Encryption and Signature
16.1 General Considerations
16.2 The Decryption Transform
Part VI: Algorithms
Chapter 17. Overview of Algorithms
17.1 Algorithm Syntax
17.2 Algorithmic Roles
Chapter 18. Cryptographic Algorithms
18.1 Message Digests
18.2 Key Agreement Algorithms
18.3 Message Authentication Codes
18.4 Signature Algorithms
18.5 Block Encryption Algorithms
18.6 Stream Encryption Algorithms
18.7 Key Transport Algorithms
18.8 Symmetric Key Wrap Algorithms
Chapter 19. Non-cryptographic Algorithms
19.1 Canonicalization Algorithms
19.2 Transformation Algorithms
Part VII: Appendixes
Appendix A. XML Security Implementations
A.1 Apache
A.2 Baltimore Technologies
A.3 Capslock
A.4 Done Information
A.5 DSTC
A.6 Entrust
A.7 Fujitsu
A.8 GapXse
A.9 HP Web Services
A.10 IAIK
A.11 IBM
A.12 Infomosaic
A.13 JDSS II
A.14 Mather
A.15 Microsoft
A.16 NEC
A.17 Phaos Technology
A.18 Poupou
A.19 RSA Security
A.20 Siggen
A.21 Verisign
A.22 W3C
A.23 WebSig
A.24 Wedgetail
A.25 XML Sec
Appendix B. The W3C and W3C Documents
B.1 Access to W3C Documents
B.2 W3C Document Status
B.3 W3C Document Format
B.4 W3C Document Disclaimer
B.5 W3C Software Disclaimer
Appendix C. The IETF and IETF Documents
C.1 RFC Status
C.2 Access to RFCs
C.3 RFC Format
Appendix D. The NIST and NIST Documents
D.1 Access to NIST FIPS Documents
D.2 Status of NIST Documents
D.3 Format of FIPS
Appendix E. The Paper and Protocol Points of View
E.1 The Basic Points of View
E.2 Questions of Meaning
E.3 Processing Models
E.4 Security and Canonicalization
E.5 Unique Internal Labels
E.6 Examples
E.7 Resolution of the Points of View
Appendix F. SOAP Encoding Schema
References and Acronyms
Secure XML: The New Syntax for Signatures and Encryption
ISBN: 0201756056
EAN: 2147483647
Year: 2005
Pages: 186
Authors:
Donald E. Eastlake
,
Kitty Niles
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Object Types, Predicates, and Basic Constraints
Configuring, Manipulating, and Reusing ORM Models
Reverse Engineering and Importing to ORM
Conceptual Model Reports
Generating a Physical Database Schema
The CISSP and CAP Prep Guide: Platinum Edition
Telecommunications and Network Security
Operations Security
The Accreditation Phase
Appendix A Answers to Assessment Questions
Appendix F Security Control Catalog
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
IDS and IPS Architecture
NFR Security
Incident Response
Policy and Procedures
Laws, Standards, and Organizations
GO! with Microsoft Office 2003 Brief (2nd Edition)
Mastery Assessments
Objective 8. Preview and Print Documents, Close a Document, and Close Word
Objective 5. Format Data and Cells
Objective 6. Copy Formulas
You and GO!
Cultural Imperative: Global Trends in the 21st Century
From 2,000,000 B.C. to A.D.2000: The Roots and Routes of Culture
The Pacific Rim: The Fourth Cultural Ecology
The China Phenomenon
Americanization versus Asianization
Appendix C National Traits
VBScript in a Nutshell, 2nd Edition
Accessing Other Object Models
WSH Language Elements
Section C.4. Logical and Bitwise Operators
Appendix D. Locale IDs
Section E.1. How Encoding and Decoding Works
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies