Selkirk, 2001 - Google Patents
Using XML security mechanismsSelkirk, 2001
- Document ID
- 5617951148660975870
- Author
- Selkirk A
- Publication year
- Publication venue
- BT technology journal
External Links
Snippet
XML is now seen as the format for a range of new security protocols, making use of XML signature and encryption standards. This may be used to provide security for Web services. In addition, a number of traditional components of a public key infrastructure could be recast …
- 239000000344 soap 0 description 35
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7496755B2 (en) | Method and system for a single-sign-on operation providing grid access and network access | |
US8185938B2 (en) | Method and system for network single-sign-on using a public key certificate and an associated attribute certificate | |
EP1714422B1 (en) | Establishing a secure context for communicating messages between computer systems | |
US7444509B2 (en) | Method and system for certification path processing | |
US10432394B2 (en) | Method and system for sharing encrypted content | |
KR101063368B1 (en) | Manage digital rights management (DRM) enforcement policy for identity providers in a federated environment | |
KR101054700B1 (en) | Manage digital rights management (DRM) enforcement policy for service providers in a federated environment | |
US20060294366A1 (en) | Method and system for establishing a secure connection based on an attribute certificate having user credentials | |
US20020144108A1 (en) | Method and system for public-key-based secure authentication to distributed legacy applications | |
US20030115342A1 (en) | Method of assembling authorization certificate chains | |
US20040199774A1 (en) | Secure method for roaming keys and certificates | |
US20020194471A1 (en) | Method and system for automatic LDAP removal of revoked X.509 digital certificates | |
Selkirk | Using XML security mechanisms | |
Yeh et al. | Applying lightweight directory access protocol service on session certification authority | |
Boeyen et al. | Liberty trust models guidelines | |
Kim et al. | Design of unified key management model using XKMS | |
Topolnik et al. | Experimental Implementation of Emerging e-Business Technologies: EbXML and PKI | |
Boeyen et al. | Trust models guidelines | |
Sultan et al. | Overcoming Barriers to Client-Side Digital Certificate Adoption | |
Peldius | Security Architecture for Web Services | |
Chakrabarti | Grid Information Security Architecture | |
Padmanabhuni et al. | Security in Service-Oriented Architecture: Issues, Standards and Implementations | |
Sharon Boeyen et al. | Liberty Trust Models Guidelines | |
Hallam-Baker | Trust Assertion XML Infrastructure | |
An | Security AND Privacy White Paper |