[go: up one dir, main page]

Selkirk, 2001 - Google Patents

Using XML security mechanisms

Selkirk, 2001

Document ID
5617951148660975870
Author
Selkirk A
Publication year
Publication venue
BT technology journal

External Links

Snippet

XML is now seen as the format for a range of new security protocols, making use of XML signature and encryption standards. This may be used to provide security for Web services. In addition, a number of traditional components of a public key infrastructure could be recast …
Continue reading at link.springer.com (other versions)

Similar Documents

Publication Publication Date Title
US7496755B2 (en) Method and system for a single-sign-on operation providing grid access and network access
US8185938B2 (en) Method and system for network single-sign-on using a public key certificate and an associated attribute certificate
EP1714422B1 (en) Establishing a secure context for communicating messages between computer systems
US7444509B2 (en) Method and system for certification path processing
US10432394B2 (en) Method and system for sharing encrypted content
KR101063368B1 (en) Manage digital rights management (DRM) enforcement policy for identity providers in a federated environment
KR101054700B1 (en) Manage digital rights management (DRM) enforcement policy for service providers in a federated environment
US20060294366A1 (en) Method and system for establishing a secure connection based on an attribute certificate having user credentials
US20020144108A1 (en) Method and system for public-key-based secure authentication to distributed legacy applications
US20030115342A1 (en) Method of assembling authorization certificate chains
US20040199774A1 (en) Secure method for roaming keys and certificates
US20020194471A1 (en) Method and system for automatic LDAP removal of revoked X.509 digital certificates
Selkirk Using XML security mechanisms
Yeh et al. Applying lightweight directory access protocol service on session certification authority
Boeyen et al. Liberty trust models guidelines
Kim et al. Design of unified key management model using XKMS
Topolnik et al. Experimental Implementation of Emerging e-Business Technologies: EbXML and PKI
Boeyen et al. Trust models guidelines
Sultan et al. Overcoming Barriers to Client-Side Digital Certificate Adoption
Peldius Security Architecture for Web Services
Chakrabarti Grid Information Security Architecture
Padmanabhuni et al. Security in Service-Oriented Architecture: Issues, Standards and Implementations
Sharon Boeyen et al. Liberty Trust Models Guidelines
Hallam-Baker Trust Assertion XML Infrastructure
An Security AND Privacy White Paper