XML and web services security standards

NA Nordbotten - IEEE Communications Surveys & Tutorials, 2009 - ieeexplore.ieee.org
XML and Web services are widely used in current distributed systems. The security of the
XML based communication, and the Web services themselves, is of great importance to the …

A policy based approach to security for the semantic web

L Kagal, T Finin, A Joshi - International semantic web conference, 2003 - Springer
Along with developing specifications for the description of meta-data and the extraction of
information for the Semantic Web, it is important to maximize security in this environment …

[PDF][PDF] Metadata for the OASIS security assertion markup language (SAML) V2. 0

S Cantor, J Moreh, R Philpott, E Maler - 2005 - docs.oasis-open.org
SAML profiles require agreements between system entities regarding identifiers, binding
support and endpoints, certificates and keys, and so forth. A metadata specification is useful …

Controlling access to published data using cryptography

G Miklau, D Suciu - Proceedings 2003 VLDB Conference, 2003 - Elsevier
Publisher Summary This chapter proposes a framework for enforcing access control policies
on published XML documents using cryptography. In this framework, the owner publishes a …

Method and apparatus for multi-domain identity interoperability and compliance verification

L Kannappan, VS Simha, H Prafullchandra - US Patent 8,434,129, 2013 - Google Patents
BACKGROUND Digital Identity is the corner stone for internet security and is becoming
pervasively important with the emergence of internet businesses and online services offered …

[PDF][PDF] Metadata for the OASIS security assertion markup language (SAML) V2. 0

S Cantor, J Moreh, R Philpott, E Maler - OASIS Standard (March 2005), 2004 - Citeseer
SAML profiles require agreements between system entities regarding identifiers, binding
support and endpoints, certificates and keys, and so forth. A metadata specification is useful …

[图书][B] Security for web services and service-oriented architectures

E Bertino, L Martino, F Paci, A Squicciarini - 2010 - Springer
Web services technologies are advancing fast and being extensively deployed in many di?
erent application environments. Web services based on the eXt-sible Markup Language …

Verified interoperable implementations of security protocols

K Bhargavan, C Fournet, AD Gordon… - ACM Transactions on …, 2008 - dl.acm.org
We present an architecture and tools for verifying implementations of security protocols. Our
implementations can run with both concrete and symbolic implementations of cryptographic …

[PDF][PDF] Profiles for the oasis security assertion markup language (saml) v2. 0

J Hughes, S Cantor, J Hodges, F Hirsch… - OASIS …, 2005 - docs.oasis-open.org
Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0 Page 1 Profiles for
the OASIS Security Assertion Markup Language (SAML) V2.0 OASIS Standard, 15 March …

Security testing methodology for vulnerabilities detection of xss in web services and ws-security

MIP Salas, E Martins - Electronic Notes in Theoretical Computer Science, 2014 - Elsevier
Due to its distributed and open nature, Web Services give rise to new security challenges.
This technology is susceptible to Cross-site Scripting (XSS) attack, which takes advantage of …