Flylib.com
Secure XML: The New Syntax for Signatures and Encryption
Secure XML: The New Syntax for Signatures and Encryption
ISBN: 0201756056
EAN: 2147483647
Year: 2005
Pages: 186
Authors:
Donald E. Eastlake
,
Kitty Niles
BUY ON AMAZON
Main Page
Table of content
Copyright
Preface
Notations
Acknowledgments
Part I: Introduction
Chapter 1. XML and Security
1.1 XML
1.2 The Need for Secure XML
1.3 Status of XML Security Standardization
1.4 Work in Progress
Chapter 2. Digital Cryptography Basics
2.1 Message Digests
2.2 Message Authentication Codes
2.3 Secret or Symmetric Key Ciphers
2.4 Public or Asymmetric Key Ciphers
2.5 Asymmetric Keys and Authentication
2.6 Digital Signatures
2.7 Certificates
2.8 Enveloped Encryption
2.9 Canonicalization
2.10 Randomness
2.11 Other Facets of Security
2.12 Cryptography: A Subtle Art
Part II: XML Basics
Chapter 3. The Extensible Markup Language
3.1 Related Standards and Recommendations
3.2 XML Documents
3.3 XML Document Structure
3.4 XML Document Logical Structure
3.5 XML Namespaces
3.6 XML Document Physical Structure
3.7 XML and Stylesheets
Chapter 4. XML Document Type Definitions
4.1 Introduction to DTDs
4.2 Document Type Declarations
4.3 Element Type Declarations
4.4 Defining Attributes in DTDs
4.5 Entity Reference Declarations
4.6 Notation Declarations
Chapter 5. XML Schema
5.1 Overview
5.2 Types
5.3 Elements and Attributes
5.4 Namespaces
5.5 Miscellaneous Aspects of Schemas
5.6 Parts Not Covered
Chapter 6. XPath: A Basic Building Block
6.1 Introduction to XPath
6.2 Data Model
6.3 Location Paths
6.4 Expressions
6.5 Function Library
Chapter 7. URIs, xml:base, and XPointer
7.1 URIs
7.2 xml:base
7.3 XPointer
Chapter 8. SOAP
8.1 Introduction to SOAP
8.2 SOAP Envelope, Message Exchange, and Processing Model
8.3 SOAP Encoding
8.4 SOAP Transport Binding and HTTP
8.5 SOAP Remote Procedure Call
Part III: Canonicalization and Authentication
Chapter 9. XML Canonicalization: The Key to Robustness
9.1 CanonicalizationEssential for Signatures Over XML
9.2 Canonical XML and XML Encryption
9.3 Transformative Summary
9.4 The XML Canonicalization Data Model
9.5 Formal Generative Specification
9.6 Limitations of XML Canonicalization
Chapter 10. XML Signatures and Authentication
10.1 Introduction to XML Digital Signatures
10.2 XML Signature Syntax
10.3 XML Signature Examples
10.4 Transforms and the Use of XPath
10.5 Processing Rules
10.6 Security of Signatures
Chapter 11. Profiling XMLDSIG for Applications
11.1 P3P XMLDSIG
11.2 SOAP XMLDSIG
Chapter 12. ETSI Advanced XML Signatures
12.1 Levels of XAdES Signature
12.2 XAdES Signature Syntax Basics
12.3 XAdES Signature Elements Syntax
12.4 Validation Data Syntax
Part IV: Keying
Chapter 13. The KeyInfo Element
KeyInfo Element Syntax
KeyInfo Child Elements
Private Keys
13.1 The KeyValue Element
13.2 The EncryptedKey Element
13.3 The RetrievalMethod Element
13.4 The AgreementMethod Element
13.5 The KeyName Element
13.6 The X509Data Element
13.7 The PGPData Element
13.8 The SPKIData Element
13.9 The MgmtData Element
Chapter 14. XKMS: XML Key Management
Namespaces
14.1 The Key Information Service
14.2 XKMS Common Data Elements
14.3 The Key Registration Service
14.4 XKMS Cryptographic Algorithms
14.5 Security Considerations
Part V: Encryption
Chapter 15. XML Encryption
15.1 Introduction to XML Encryption
15.2 XML Encryption Syntax
15.3 Encryption Examples
15.4 Processing Flow
15.5 Encryption Security Considerations
Chapter 16. Combining Encryption and Signature
16.1 General Considerations
16.2 The Decryption Transform
Part VI: Algorithms
Chapter 17. Overview of Algorithms
17.1 Algorithm Syntax
17.2 Algorithmic Roles
Chapter 18. Cryptographic Algorithms
18.1 Message Digests
18.2 Key Agreement Algorithms
18.3 Message Authentication Codes
18.4 Signature Algorithms
18.5 Block Encryption Algorithms
18.6 Stream Encryption Algorithms
18.7 Key Transport Algorithms
18.8 Symmetric Key Wrap Algorithms
Chapter 19. Non-cryptographic Algorithms
19.1 Canonicalization Algorithms
19.2 Transformation Algorithms
Part VII: Appendixes
Appendix A. XML Security Implementations
A.1 Apache
A.2 Baltimore Technologies
A.3 Capslock
A.4 Done Information
A.5 DSTC
A.6 Entrust
A.7 Fujitsu
A.8 GapXse
A.9 HP Web Services
A.10 IAIK
A.11 IBM
A.12 Infomosaic
A.13 JDSS II
A.14 Mather
A.15 Microsoft
A.16 NEC
A.17 Phaos Technology
A.18 Poupou
A.19 RSA Security
A.20 Siggen
A.21 Verisign
A.22 W3C
A.23 WebSig
A.24 Wedgetail
A.25 XML Sec
Appendix B. The W3C and W3C Documents
B.1 Access to W3C Documents
B.2 W3C Document Status
B.3 W3C Document Format
B.4 W3C Document Disclaimer
B.5 W3C Software Disclaimer
Appendix C. The IETF and IETF Documents
C.1 RFC Status
C.2 Access to RFCs
C.3 RFC Format
Appendix D. The NIST and NIST Documents
D.1 Access to NIST FIPS Documents
D.2 Status of NIST Documents
D.3 Format of FIPS
Appendix E. The Paper and Protocol Points of View
E.1 The Basic Points of View
E.2 Questions of Meaning
E.3 Processing Models
E.4 Security and Canonicalization
E.5 Unique Internal Labels
E.6 Examples
E.7 Resolution of the Points of View
Appendix F. SOAP Encoding Schema
References and Acronyms
Secure XML: The New Syntax for Signatures and Encryption
ISBN: 0201756056
EAN: 2147483647
Year: 2005
Pages: 186
Authors:
Donald E. Eastlake
,
Kitty Niles
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Introduction to Computer Programming
More Power to the Numbers Data Sequences and Arrays
Number Crunching Mathematical and Relational Operators and Commands
Basic Graphics Commands
Appendix A Answers to the Chapter Quizzes
Systematic Software Testing (Artech House Computer Library)
Risk Analysis
Master Test Planning
Detailed Test Planning
The Test Organization
Appendix F Process Diagrams
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Team change
Organizational change
Restructuring
IT-based process change
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity I
IDS and IPS Architecture
Internet Security Systems RealSecure
NFR Security
Laws, Standards, and Organizations
GO! with Microsoft Office 2003 Brief (2nd Edition)
Designing Effective Worksheets
Objective 11. Use the Access Help System
Problem Solving Assessments
Business Running Case
Objective 4. Open a Saved Main Document for Mail Merge
.NET-A Complete Development Cycle
The C# Language
Dynamic Loading of Components
Analysis of the Image Postprocessing Requirements
Project Management Issues
Deployment
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies