Flylib.com
Secure XML: The New Syntax for Signatures and Encryption
Secure XML: The New Syntax for Signatures and Encryption
ISBN: 0201756056
EAN: 2147483647
Year: 2005
Pages: 186
Authors:
Donald E. Eastlake
,
Kitty Niles
BUY ON AMAZON
Main Page
Table of content
Copyright
Preface
Notations
Acknowledgments
Part I: Introduction
Chapter 1. XML and Security
1.1 XML
1.2 The Need for Secure XML
1.3 Status of XML Security Standardization
1.4 Work in Progress
Chapter 2. Digital Cryptography Basics
2.1 Message Digests
2.2 Message Authentication Codes
2.3 Secret or Symmetric Key Ciphers
2.4 Public or Asymmetric Key Ciphers
2.5 Asymmetric Keys and Authentication
2.6 Digital Signatures
2.7 Certificates
2.8 Enveloped Encryption
2.9 Canonicalization
2.10 Randomness
2.11 Other Facets of Security
2.12 Cryptography: A Subtle Art
Part II: XML Basics
Chapter 3. The Extensible Markup Language
3.1 Related Standards and Recommendations
3.2 XML Documents
3.3 XML Document Structure
3.4 XML Document Logical Structure
3.5 XML Namespaces
3.6 XML Document Physical Structure
3.7 XML and Stylesheets
Chapter 4. XML Document Type Definitions
4.1 Introduction to DTDs
4.2 Document Type Declarations
4.3 Element Type Declarations
4.4 Defining Attributes in DTDs
4.5 Entity Reference Declarations
4.6 Notation Declarations
Chapter 5. XML Schema
5.1 Overview
5.2 Types
5.3 Elements and Attributes
5.4 Namespaces
5.5 Miscellaneous Aspects of Schemas
5.6 Parts Not Covered
Chapter 6. XPath: A Basic Building Block
6.1 Introduction to XPath
6.2 Data Model
6.3 Location Paths
6.4 Expressions
6.5 Function Library
Chapter 7. URIs, xml:base, and XPointer
7.1 URIs
7.2 xml:base
7.3 XPointer
Chapter 8. SOAP
8.1 Introduction to SOAP
8.2 SOAP Envelope, Message Exchange, and Processing Model
8.3 SOAP Encoding
8.4 SOAP Transport Binding and HTTP
8.5 SOAP Remote Procedure Call
Part III: Canonicalization and Authentication
Chapter 9. XML Canonicalization: The Key to Robustness
9.1 CanonicalizationEssential for Signatures Over XML
9.2 Canonical XML and XML Encryption
9.3 Transformative Summary
9.4 The XML Canonicalization Data Model
9.5 Formal Generative Specification
9.6 Limitations of XML Canonicalization
Chapter 10. XML Signatures and Authentication
10.1 Introduction to XML Digital Signatures
10.2 XML Signature Syntax
10.3 XML Signature Examples
10.4 Transforms and the Use of XPath
10.5 Processing Rules
10.6 Security of Signatures
Chapter 11. Profiling XMLDSIG for Applications
11.1 P3P XMLDSIG
11.2 SOAP XMLDSIG
Chapter 12. ETSI Advanced XML Signatures
12.1 Levels of XAdES Signature
12.2 XAdES Signature Syntax Basics
12.3 XAdES Signature Elements Syntax
12.4 Validation Data Syntax
Part IV: Keying
Chapter 13. The KeyInfo Element
KeyInfo Element Syntax
KeyInfo Child Elements
Private Keys
13.1 The KeyValue Element
13.2 The EncryptedKey Element
13.3 The RetrievalMethod Element
13.4 The AgreementMethod Element
13.5 The KeyName Element
13.6 The X509Data Element
13.7 The PGPData Element
13.8 The SPKIData Element
13.9 The MgmtData Element
Chapter 14. XKMS: XML Key Management
Namespaces
14.1 The Key Information Service
14.2 XKMS Common Data Elements
14.3 The Key Registration Service
14.4 XKMS Cryptographic Algorithms
14.5 Security Considerations
Part V: Encryption
Chapter 15. XML Encryption
15.1 Introduction to XML Encryption
15.2 XML Encryption Syntax
15.3 Encryption Examples
15.4 Processing Flow
15.5 Encryption Security Considerations
Chapter 16. Combining Encryption and Signature
16.1 General Considerations
16.2 The Decryption Transform
Part VI: Algorithms
Chapter 17. Overview of Algorithms
17.1 Algorithm Syntax
17.2 Algorithmic Roles
Chapter 18. Cryptographic Algorithms
18.1 Message Digests
18.2 Key Agreement Algorithms
18.3 Message Authentication Codes
18.4 Signature Algorithms
18.5 Block Encryption Algorithms
18.6 Stream Encryption Algorithms
18.7 Key Transport Algorithms
18.8 Symmetric Key Wrap Algorithms
Chapter 19. Non-cryptographic Algorithms
19.1 Canonicalization Algorithms
19.2 Transformation Algorithms
Part VII: Appendixes
Appendix A. XML Security Implementations
A.1 Apache
A.2 Baltimore Technologies
A.3 Capslock
A.4 Done Information
A.5 DSTC
A.6 Entrust
A.7 Fujitsu
A.8 GapXse
A.9 HP Web Services
A.10 IAIK
A.11 IBM
A.12 Infomosaic
A.13 JDSS II
A.14 Mather
A.15 Microsoft
A.16 NEC
A.17 Phaos Technology
A.18 Poupou
A.19 RSA Security
A.20 Siggen
A.21 Verisign
A.22 W3C
A.23 WebSig
A.24 Wedgetail
A.25 XML Sec
Appendix B. The W3C and W3C Documents
B.1 Access to W3C Documents
B.2 W3C Document Status
B.3 W3C Document Format
B.4 W3C Document Disclaimer
B.5 W3C Software Disclaimer
Appendix C. The IETF and IETF Documents
C.1 RFC Status
C.2 Access to RFCs
C.3 RFC Format
Appendix D. The NIST and NIST Documents
D.1 Access to NIST FIPS Documents
D.2 Status of NIST Documents
D.3 Format of FIPS
Appendix E. The Paper and Protocol Points of View
E.1 The Basic Points of View
E.2 Questions of Meaning
E.3 Processing Models
E.4 Security and Canonicalization
E.5 Unique Internal Labels
E.6 Examples
E.7 Resolution of the Points of View
Appendix F. SOAP Encoding Schema
References and Acronyms
Secure XML: The New Syntax for Signatures and Encryption
ISBN: 0201756056
EAN: 2147483647
Year: 2005
Pages: 186
Authors:
Donald E. Eastlake
,
Kitty Niles
BUY ON AMAZON
Introducing Microsoft Office InfoPath 2003 (Bpg-Other)
Understanding Form Technologies
Validating Form Data
Adding Views to a Template
Publishing Form Templates
Designing InfoPath Web Service Clients
Lotus Notes and Domino 6 Development (2nd Edition)
Whats New in Release 6?
Designing Views
Using Hide When Formulas
Real-World Example 2: Delete a Parent Document and All Its Children: DeleteParentAndChildren
A Look at JavaScript in Domino
A Practitioners Guide to Software Test Design
Equivalence Class Testing
Decision Table Testing
State-Transition Testing
Domain Analysis Testing
Section II - White Box Testing Techniques
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Understanding Intrusion Detection
Internet Security Systems RealSecure
Cisco Secure IDS
Snort
The Future of Intrusion Detection and Prevention
FileMaker 8 Functions and Scripts Desk Reference
Get(FileMakerPath)
MonthNameJ()
The Custom Function Interface
About FileMaker Scripting
Essential Shortcuts by Group
Digital Character Animation 3 (No. 3)
Surface Types
Chapter Three. Rigging Characters
Hierarchies and Character Animation
Conclusion
Acting and the Body
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies