Using semantic rules to determine access control for web services
Proceedings of the 15th international conference on World Wide Web
A method for access authorisation through delegation networks
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
What can identity-based cryptography offer to web services?
Proceedings of the 2007 ACM workshop on Secure web services
A privacy controller approach for privacy protection in web services
Proceedings of the 2007 ACM workshop on Secure web services
Security for service oriented architectures
Journal of Computing Sciences in Colleges
An arbitration web service for e-learning based on xml security standards
WSEAS Transactions on Computers
The practical application of a process for eliciting and designing security in web service systems
Information and Software Technology
Teaching federated identity in computer and information science
Journal of Computing Sciences in Colleges
Approach to solving security problems using meta-agents in multi agent system
KES-AMSTA'08 Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
An effective access control approach to support web service security
Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services
Data-centric security: integrating data privacy and data security
IBM Journal of Research and Development
WAIM'05 Proceedings of the 6th international conference on Advances in Web-Age Information Management
Proposal of a new message protocol for IEEE 802.11
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Hi-index | 0.00 |
Explains how to implement secure Web services and includes coverage of trust, confidentiality, cryptography, authentication, authorization, and Kerberos. You’ll also find details on Security Assertion Markup Language (SAML), XML Key Management Specification (XKMS), XML Encryption, Hypertext Transfer Protocol-Reliability (HTTP-R) and more.Table of contents Part I: Introduction 1: Presenting Web Services 2: Presenting Security 3: New Challenges and New Threats Part II: XML Security 4: XML Signature 5: XML Encryption 6: SAML 7: XACML 8: XML Key Management Specification (XKMS) Part III: Security in SOAP: Presenting WS-Security 9: WS-Security Part IV: Security in Web Services Frameworks 10: .NET and Passport 11: The Liberty Alliance Project 12: UDDI and Security Part V: Conclusion 13: ebXML 14: Legal Considerations A: Case Studies