Web Services Architecture and Its Specifications [Electronic resources] : Essentials for Understanding WS-* نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Web Services Architecture and Its Specifications [Electronic resources] : Essentials for Understanding WS-* - نسخه متنی

Luis Felipe Cabrera, Chris Kurt

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید




Index

[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]

SAML (Security Assertion Markup Language)

scenarios.
[See School of Fine Art example]

schema types for messages

School of Fine Art example

directory-based discovery example

dynamic discovery

encryption example

endpoint references

enumeration example

FaultTo addresses

HTTP message headers

identifiers, message

Infoset for

message exchanges

metadata

mustUnderstand attribute

overview

processing semantics

referencing addresses

reply addresses

secure conversation example

security

signatures for

SOAP example

trust creation

water fountains example

WS-AtomicTransaction

WS-Eventing in

WS-Management

WS-Policy for

WS-Transfer example

WSDL for

SCTs (Security Context Tokens) 2nd

security

assertion proof requirement

attacks against

authentication 2nd 3rd 4th

authorization 2nd

autonomous services implications

Basic Security Profile

claims

confidentiality 2nd 3rd

contexts

domains

encryption for.
[See encryption]

end-to-end message security requirements

existing approaches, reuse of

hash creation

identities

integrity 2nd

message-level

models supported

overview

policies.
[See WS-Policy]

principals

relay services

requestors, federated

School of Fine Art example

serialization issues

sign-out operations

signature for.
[See signatures]

specification.
[See WS-Security]

system federations

tokens.
[See tokens, security]

transport-level, limitations of

trust-based tokens

trust.
[See WS-Trust]

WS-Federation

WS-SecureConversation 2nd

X.509 2nd

XML Signature

Security Assertion Markup Language (SAML)

Security Context Tokens (SCTs) 2nd

security contexts 2nd

security policies [See also WS-Policy]

Security Token Service (STS) 2nd

security tokens.
[See tokens, security]

sequences of messages

serialization

defined

security issues

service autonomy.
[See autonomous services]

service elements, WSDL

service orientation

services defined

shared secrets

sign-out operations 2nd

signatures

canonicalization

defined

elements for

message body encryption with

multiple

School of Fine Art example

security tokens for

X.509 tokens for

XML Signature

signed security tokens

Single Sign On (SSO)

smart requestors

SOAP

Action elements 2nd 3rd 4th

address blocks

advantages of

attachments example

autonomous services with

Body elements 2nd

Coordination Context header blocks

encryption issues

Envelope elements 2nd

Header elements 2nd 3rd 4th

header mechanism 2nd

HTTP message headers

intermediary nodes

message elements

message exchange patterns

message orientation based on

message transmittal

messaging specifications

MIME with

MTOM 2nd

mustUnderstand attribute 2nd 3rd

Next role

nodes 2nd

processing model

protocol composability with

purpose

relay attribute

roles

School of Fine Art message example

transport independence

UltimateReceiver role

WS-Addressing bindings

XOP

specification profiles

spontaneous coordination

spoofing attacks

SSO (Single Sign On)

STAR (Secure Transacted and Reliable)

state management

STS (Security Token Service) 2nd

subscriptions

batched delivery

batched events

ending subscriptions

event sinks with

expiration dates

GetStatus messages

GetStatusResponse messages

message scenario

Notification messages

Pull delivery

Renew messages

RenewReponse messages

Subscribe messages

SubscribeResponse messages 2nd

Trap Delivery messages

unsubscribe messages

unsubscribe response messages

WS-Eventing

WS-Management

symmetric key algorithms

synchronous request/response pattern 2nd

systems management applications.
[See WS-Management]

systems, defined

/ 130