Flylib.com
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
ISBN: 0672326515
EAN: 2147483647
Year: 2004
Pages: 119
Authors:
Jothy Rosenberg
,
David Remy
BUY ON AMAZON
Securing Web Services with WS-Security
Table of Contents
Copyright
About the Authors
Acknowledgments
We Want to Hear from You
Forewords
Securing Web Services to Deliver on Their Promise
Building the Foundation for Agile Computing
Introduction
Who This Book Is For
About This Book
How This Book Is Organized
Chapter 1. Basic Concepts of Web Services Security
Web Services Basics: XML, SOAP, and WSDL
Application Integration
Security Basics
Web Services Security Basics
Summary
Chapter 2. The Foundations of Web Services
The Gestalt of Web Services
XML: Meta-Language for Data-Oriented Interchange
SOAP: XML Messaging and Remote Application Access
WSDL: Schema for XMLSOAP Objects and Interfaces
UDDI: Publishing and Discovering Web Services
ebXML and RosettaNet: Alternative Technologies for Web Services
The Web Services Security Specifications
Summary
Chapter 3. The Foundations of Distributed Message-Level Security
The Challenges of Information Security for Web Services
Shared Key Technologies
Public Key Technologies
Summary
Chapter 4. Safeguarding the Identity and Integrity of XML Messages
Introduction To and Motivation for XML Signature
XML Signature Fundamentals
XML Signature Structure
XML Signature Processing
The XML Signature Elements
Security Strategies for XML Signature
Summary
Chapter 5. Ensuring Confidentiality of XML Messages
Introduction to and Motivation for XML Encryption
XML Encryption Fundamentals
XML Encryption Structure
XML Encryption Processing
Using XML Encryption and XML Signature Together
Summary
Chapter 6. Portable Identity, Authentication, and Authorization
Introduction to and Motivation for SAML
How SAML Works
Using SAML with WS-Security
Applying SAML: Project Liberty
Summary
Chapter 7. Building Security into SOAP
Introduction to and Motivation for WS-Security
Extending SOAP with Security
Security Tokens in WS-Security
Providing Confidentiality: XML Encryption in WS-Security
Providing Integrity: XML Signature in WS-Security
Message Time Stamps
Summary
Chapter 8. Communicating Security Policy
WS-Policy
The WS-Policy Framework
WS-SecurityPolicy
Summary
Chapter 9. Trust, Access Control, and Rights for Web Services
The WS- Family of Security Specifications
XML Key Management Specification (XKMS)
eXtensible Access Control Markup Language (XACML) Specification
eXtensible Rights Markup Language (XrML) Management Specification
Summary
Chapter 10. Building a Secure Web Service Using BEA s WebLogic Workshop
Security Layer Walkthrough
WebLogic Workshop Web Service Walkthrough
Summary
Appendix A. Security, Cryptography, and Protocol Background Material
The SSL Protocol
Testing for Primality
RSA Cryptography
DSA Digital Signature Algorithms
Block Cipher Processing
DES Encryption Algorithm
AES Encryption Algorithm
Hashing Details and Requirements
SHA1
Silvio Micali s Fast ValidationRevocation
Canonicalization of Messages for Digital Signature Manifests
Base-64 Encoding
PGP
Glossary
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_R
index_S
index_T
index_U
index_V
index_W
index_X
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
ISBN: 0672326515
EAN: 2147483647
Year: 2004
Pages: 119
Authors:
Jothy Rosenberg
,
David Remy
BUY ON AMAZON
Java for RPG Programmers, 2nd Edition
Javas Language And Syntax
Data Types And Variables
String Manipulation
More Java
Appendix C Obtaining The Code Samples
Visual C# 2005 How to Program (2nd Edition)
Declaring a Method with a Parameter
Demonstrating Polymorphic Behavior
Drawing Lines, Rectangles and Ovals
Case Study: Connecting to a Database in ASP.NET
G.8. meta Elements
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 19. Analyze Elevation Profiles for Wireless Community Networks
Hack 40. Plot Points on a Spinning Globe Applet
Hack 51. Speak in Geotongues: GPSBabel to the Rescue
Hack 57. Connect to Your GPS from Multiple Applications
Hack 96. Share Geo-Photos on the Web
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
3-D Layers from Photoshop Layers
Blue-Screen Garbage Mattes
Color, Light, and Focus
Atmosphere, Film, and Noise Effects
Appendix Adobe Photoshop and After Effects Resources
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
Building Quartz from Source
Creating a Quartz Plug-In
Testing the RMI Server and Client
What Does Clustering Mean to Quartz?
Configuring the Quartz ThreadPool
Comparing, Designing, and Deploying VPNs
Summary
Summary
Review Questions
Summary
Summary
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies