Securing web services with WS-security: demystifying WS-security, WS-policy, SAML, XML signature, and XML encryption
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Indianapolis, Ind.
SAMS
2008
|
Ausgabe: | 4. print. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XIV, 378 S. Ill., graph. Darst. |
ISBN: | 0672326515 9780672326516 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV024628126 | ||
003 | DE-604 | ||
005 | 20090910 | ||
007 | t | ||
008 | 090924s2008 ad|| |||| 00||| eng d | ||
020 | |a 0672326515 |9 0-672-32651-5 | ||
020 | |a 9780672326516 |9 978-0-672-32651-6 | ||
035 | |a (OCoLC)705332669 | ||
035 | |a (DE-599)BVBBV024628126 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-83 |a DE-11 |a DE-739 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Rosenberg, Jothy |e Verfasser |4 aut | |
245 | 1 | 0 | |a Securing web services with WS-security |b demystifying WS-security, WS-policy, SAML, XML signature, and XML encryption |c Jothy Rosenberg ; David L. Remy |
250 | |a 4. print. | ||
264 | 1 | |a Indianapolis, Ind. |b SAMS |c 2008 | |
300 | |a XIV, 378 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Web Services |0 (DE-588)4691234-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Web Services |0 (DE-588)4691234-4 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
700 | 1 | |a Remy, David L. |e Verfasser |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018599801&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-018599801 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804140651008229376 |
---|---|
adam_text | Contents
At a Glance
Forewords
xx
Introduction
1
1
Basic Concepts of Web Services Security
5
2
The Foundations ofWeb Services
25
3
The Foundations of Distributed Message-Level
Security
69
4
Safeguarding the Identity and Integrity of XML
Messages
105
5
Ensuring Confidentiality of XML Messages
147
6
Portable Identity, Authentication, and
Authorization
177
7
Building Security into SOAP
201
8
Communicating Security Policy
235
9
Trust, Access Control, and Rights for Web
Services
255
10
Building a Secure Web Service Using BEA s
WebLogic Workshop
293
A Security, Cryptography, and Protocol Background
Material
331
Glossary
347
Index
367
Table of
Contents
Forewords
xx
Introduction
1
Who This Book Is For
1
About This Book
1
How This Book Is Organized
2
1
Basic Concepts of Web Services Security I
Web Services Basics: XML, SOAP, and WSDL
6
XML and XML Schema
6
SOAP
7
WSDL
9
UDDI
9
Application Integration
9
B2B Business Process Integration
10
Portals
11
Service-Oriented Architectures
11
Definition ofWeb Services
12
Security Basics
12
Shared Key and Public Key Technologies
13
Security Concepts and
Définitions
16
Web Services Security Basics
19
XML Signature
19
XML Encryption
20
SAML
20
WS-Security
21
Trust Issues
22
Other WS-Security-Related Specs
22
Summary
22
2
The Foundations of Web Services
25
The
Gestak ofWeb
Services
25
Application Integration
25
The Evolution of Distributed Computing
28
The Inevitability of Web Services
32
Security Challenges
35
XML: Meta-Language
for Data-Oriented
Interchange
37
Where XML Came From and Why It s
Important
38
XML and Web Services
39
XML Namespaces
39
XML Schema
42
XML Transformations
43
XML s Role in Web Services Security
46
SOAP: XML Messaging and Remote Application
Access
49
Where SOAP Came From and Why It s
Important
50
SOAP Envelope
52
SOAP Header
53
SOAP Body
53
SOAP Processing
55
SOAP Attachments
55
SOAP and Web Services Security
55
WSDL: Schema for XML/SOAP Objects and
Interfaces
56
Where WSDL Came From and Why It s
Important
56
WSDL Elements
58
WSDL and SOAP
61
WSDL and Web Services Security
61
UDDI: Publishing and Discovering Web Services
62
ebXML and RosettaNet: Alternative Technologies for
Web Services
65
The Web Services Security Specifications
65
Summary
67
3
The Foundations of Distributed Message-
Level Security
69
The Challenges of Information Security for Web
Services
69
Security of Distributed Systems Is Hard
69
Security of Exchanged Information (Messages) Is
Harder
70
Security of Web Services Is Hardest
71
Shared Key Technologies
72
Shared Key Encryption
72
Kerberos 75
Limitations of Shared Key Technologies
76
Public Key Technologies
76
Public Key Encryption
76
Limitations of Public Key Encryption
79
Digital Signature Basics
80
A Digital Signature Expressed in XML
85
Public Key Infrastructure
86
SSL Transport Layer Security
97
Summary
102
4
Safeguarding the Identity and Integrity of
XML Messages
105
Introduction To and Motivation for XML
Signature
105
AW3C Standard
105
Critical Building Block forWS-Security
105
Close Associations with Web Services
Security
106
The Goal of Ensuring Integrity (and Usually
Identity) and Non-repudiation Persistently
106
XML Signature and XML Encryption:
Fundamental Web Services Security
Technologies
106
XML Signature Fundamentals
107
XML Signature Structure
107
Basic Structure
108
Specifying the Items Being Signed
109
Types of XML Signatures
109
The Signature Element Schema
113
XML Signature Processing
116
XML Signature Generation
117
XML Signature Validation
119
The XML Signature Elements
120
The Signedlnf
о
Element
120
The CanonicalizationMethod Element and
Canonicalization
120
The SignatureMethod Element
125
The
Ref
eretice
Element
125
The Transform Element
127
The DigestMethod Element
132
The DigestValue Element
133
The SignatureValue Element
133
The Object Element
133
The Keylnf
о
Element
137
Security Strategies for XML Signature
140
Using Transforms
140
Knowing the Security Model
141
Knowing Your Keys
142
Signing Object Elements
142
Signing DTDs with Entity References
142
Summary
144
5
Ensuring Confidentiality of XML
Messages
147
Introduction to and Motivation for XML
Encryption
147
Relating XML Encryption and XML
Signature
147
Critical Building Block for WS-Security
148
The Goal Is to Ensure Confidentiality of
Messages from End to End with Different
Recipients
149
Think Shared Key Cryptography When You
Think of XML Encryption
149
XML Encryption Will Become Part of the
Infrastructure Like XML Signature
149
XML Encryption Fundamentals
150
XML Encryption Structure
151
EncryptedDataiThe Core of XML
Encryption
151
EncryptedData Schema
152
EncryptedType
153
EncryptionMethod
154
CipherData
154
EncryptionProperties
155
Keyinfo 156
EncryptedKey
157
AgreementMethod
159
ReferenceList
160
CarriedKeyName
161
Super Encryption
162
XML Encryption Processing
163
Encryption Process
163
Decryption Process
164
Using XML Encryption and XML Signature
Together
165
The Decryption Transform for XML
Signature
168
XML Encryption and XML Signature
Strategies
175
Summary
176
6
Portable Identity, Authentication, and
Authorization
177
Introduction to and Motivation for SAML
178
The Problems SAML Addresses
179
Transporting Identity or Portable Trust
181
The Concept of Trust Assertions
181
How SAML Works
181
SAML Assertions
184
SAML Producers and Consumers
188
SAML Protocol
189
Authorization Request
191
SAML Bindings
192
SAML Profiles
194
Using SAML with WS-Security
195
The WS-Security SAML Profile
196
Applying SAML: Project Liberty
197
The Identity Problem
197
Federated Identity
197
How Liberty Uses SAML
198
The Microsoft Passport Alternative
Approach
199
Summary
200
7
Building
Security into SOAP
201
Introduction to and Motivation forWS-Security
201
Problems and Goals
201
The Origins of WS-Security
205
WS-Security Is Foundational
206
Extending SOAP with Security
206
Security Tokens in WS-Security
208
UsernameToken
209
BinarySecurityTokens
212
XML Tokens
215
Referencing Security Tokens
220
Providing Confidentiality: XML Encryption in
WS-Security
222
Shared Key XML Encryption
222
Wrapped Key XML Encryption
223
Encrypting Attachments
224
WS-Security Encryption Summary
227
Providing Integrity: XML Signature in
WS-Security
227
XML Signature for Validating a Security
Token
227
XML Signature for Message Integrity
228
XML Signature in WS-Security
Considerations
228
WS-Security XML Signature Example
228
Signing a Security Token Reference
229
Message Time Stamps
230
Summary
232
8
Communicating Security Policy
235
WS-Policy
235
WS-PolicyandWSDL
236
WS-Policy andWS-SecuntyPolicy
236
The WS-Policy Framework
237
WS-Policy Details
238
WS-PolicyAssertions
240
WS-PolicyAttachment
241
Specifying WS-Policy in WSDL
242
WS-SecurityPolicy
245
Securi
tyToken
245
Integrity
248
Confidentiality
250
Visibility
251
SecurityHeader
252
MessageAge
253
Summary
253
9
Trust, Access Control, and Rights for Web
Services
255
TheWS-* Family of Security Specifications
255
WS-* Security Specifications for Trust
Relationships
258
WS-* Security Specifications for Interoperability
265
WS-* Security Specifications for Integration
269
XML Key Management Specification (XKMS)
272
Origins of XKMS
272
Goals of XKMS
272
The XKMS Services
273
extensible Access Control Markup Language
(XACML) Specification
279
The XACML Data Model
280
XACML Operation
281
XACML Policy Example
282
extensible Rights Markup Language (XrML)
Management Specification
284
The XrML Data Model
285
XrML Use Case Example
285
Summary
290
10
Building a Secure Web Service Using BEA s
WebLogic Workshop
293
Security Layer Walkthrough
294
Transport-Level Security
295
Message-Level Security
296
Role-Based Security
297
WebLogic Workshop Web Service Walkthrough
297
Transport Security
302
Message-Based Security
312
Summary
330
A Security, Cryptography, and Protocol
Background Material
331
The SSL Protocol
331
Testing for Primality
333
RSA Cryptography
334
Choosing RSA Key Pairs
335
Padding
335
RSA Encryption
335
RSA Decryption
336
DSA Digital Signature Algorithms
336
DSA Key Generation
336
DSA Algorithm Operation
337
Block Cipher Processing
337
Block Cipher Padding (PKCS#5)
337
Block Cipher Feedback
338
DES
Encryption Algorithm
338
AES Encryption Algorithm
339
Hashing Details and Requirements
339
Motivation for Using Hash Functions
340
Requirements for Digital Signature
340
SHA1
340
Collision Resistance
341
Security
341
Simplicity and Efficiency
341
Silvio
Micali
s Fast
Validation/Revocation
341
Validity Check
342
Revocation
343
Canonicalization of Messages for Digital Signature
Manifests
343
Canonicalization VI Transform Steps
343
Canonicalization Subtleties: Exclusive
Canonicalization
344
Base-64
Encoding
345
PGP
346
Glossary
347
Index
367
|
any_adam_object | 1 |
author | Rosenberg, Jothy Remy, David L. |
author_facet | Rosenberg, Jothy Remy, David L. |
author_role | aut aut |
author_sort | Rosenberg, Jothy |
author_variant | j r jr d l r dl dlr |
building | Verbundindex |
bvnumber | BV024628126 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)705332669 (DE-599)BVBBV024628126 |
discipline | Informatik |
edition | 4. print. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01882nam a2200445 c 4500</leader><controlfield tag="001">BV024628126</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090910 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090924s2008 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0672326515</subfield><subfield code="9">0-672-32651-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780672326516</subfield><subfield code="9">978-0-672-32651-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)705332669</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV024628126</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rosenberg, Jothy</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing web services with WS-security</subfield><subfield code="b">demystifying WS-security, WS-policy, SAML, XML signature, and XML encryption</subfield><subfield code="c">Jothy Rosenberg ; David L. Remy</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">4. print.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Ind.</subfield><subfield code="b">SAMS</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 378 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Web Services</subfield><subfield code="0">(DE-588)4691234-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Web Services</subfield><subfield code="0">(DE-588)4691234-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Remy, David L.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018599801&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018599801</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV024628126 |
illustrated | Illustrated |
indexdate | 2024-07-09T22:03:22Z |
institution | BVB |
isbn | 0672326515 9780672326516 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018599801 |
oclc_num | 705332669 |
open_access_boolean | |
owner | DE-83 DE-11 DE-739 |
owner_facet | DE-83 DE-11 DE-739 |
physical | XIV, 378 S. Ill., graph. Darst. |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | SAMS |
record_format | marc |
spelling | Rosenberg, Jothy Verfasser aut Securing web services with WS-security demystifying WS-security, WS-policy, SAML, XML signature, and XML encryption Jothy Rosenberg ; David L. Remy 4. print. Indianapolis, Ind. SAMS 2008 XIV, 378 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Web Services (DE-588)4691234-4 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Web Services (DE-588)4691234-4 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Rechnernetz (DE-588)4070085-9 s 2\p DE-604 Remy, David L. Verfasser aut Digitalisierung UB Passau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018599801&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Rosenberg, Jothy Remy, David L. Securing web services with WS-security demystifying WS-security, WS-policy, SAML, XML signature, and XML encryption Web Services (DE-588)4691234-4 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4691234-4 (DE-588)4070085-9 (DE-588)4274324-2 |
title | Securing web services with WS-security demystifying WS-security, WS-policy, SAML, XML signature, and XML encryption |
title_auth | Securing web services with WS-security demystifying WS-security, WS-policy, SAML, XML signature, and XML encryption |
title_exact_search | Securing web services with WS-security demystifying WS-security, WS-policy, SAML, XML signature, and XML encryption |
title_full | Securing web services with WS-security demystifying WS-security, WS-policy, SAML, XML signature, and XML encryption Jothy Rosenberg ; David L. Remy |
title_fullStr | Securing web services with WS-security demystifying WS-security, WS-policy, SAML, XML signature, and XML encryption Jothy Rosenberg ; David L. Remy |
title_full_unstemmed | Securing web services with WS-security demystifying WS-security, WS-policy, SAML, XML signature, and XML encryption Jothy Rosenberg ; David L. Remy |
title_short | Securing web services with WS-security |
title_sort | securing web services with ws security demystifying ws security ws policy saml xml signature and xml encryption |
title_sub | demystifying WS-security, WS-policy, SAML, XML signature, and XML encryption |
topic | Web Services (DE-588)4691234-4 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Web Services Rechnernetz Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018599801&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT rosenbergjothy securingwebserviceswithwssecuritydemystifyingwssecuritywspolicysamlxmlsignatureandxmlencryption AT remydavidl securingwebserviceswithwssecuritydemystifyingwssecuritywspolicysamlxmlsignatureandxmlencryption |