IT Management  >   Systems Operations  >   Security  >   Web Application Security  >  

XML Web Services Security

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Web Services Trust Language (WS-Trust) is a specification that uses the secure messaging mechanisms of WS-Security to facilitate trust relationships in diverse Web service environments. WS-Trust is an integral part of the Microsoft model for a standards-based distributed identity infrastructure. WS-Trust also an important element of Windows CardSpace, an interface intended for the exchange of user  … 
Definition continues below.
XML Web Services Security White Papers (View All Report Types)
 
Maintaining Trust: Protecting Your Web Site Users from Malware
sponsored by IBM
WHITE PAPER: This paper explores the problem of malware and how it is increasingly being delivered through legitimate Web sites. It also introduces new techniques from IBM that are designed to go beyond standard security measures to help organizations proactively defend against threats.
Posted: 31 Dec 2009 | Published: 02 Nov 2009

IBM

SOA Worst Practices Volume II: A Look at Governance
sponsored by Progress
WHITE PAPER: This white paper is a collection of dubious case studies of SOA governance implementations. Each scenario describes and analyzes the critical SOA errors and lessons learned, and then offers corrective possibilities.
Posted: 08 Mar 2007 | Published: 01 Dec 2006

Progress

Simplify Security for REST and WS* Web Services: The Gateway Approach
sponsored by Intel
WHITE PAPER: This solution brief presents how to simplify the implementation of standardized enterprise security for both REST and WS-* services, and how a Service Gateway can act as a central Policy Enforcement Point to delegate authentication/authorization and provide REST to SOAP mediations without having to write code.
Posted: 29 Mar 2011 | Published: 28 Mar 2011

Intel

Taking the fear out of bringing Government Systems online
sponsored by IBM
WHITE PAPER: People are quickly navigating to a more mobile environment and many individuals are urging government agencies to develop online services. In the past, certain aspects of online sharing have caused government agencies to hesitate, but this white paper helps outline some of the benefits of online systems.
Posted: 27 Dec 2012 | Published: 24 Jul 2012

IBM

Malicious JavaScript Attacks: What Can You Do?
sponsored by Sophos, Inc.
WHITE PAPER: We’ll review what to watch for, as well as the security strategies that will help keep you safe.
Posted: 12 Jan 2011 | Published: 11 Jan 2011

Sophos, Inc.

Beginner's Guide to SSL Certificates: Making the Best Choice When Considering Your Online Security Options
sponsored by Symantec Website Security Solutions
WHITE PAPER: This helpful guide explains how the effective implementation of SSL certificates is critical to protecting your customers, earning their trust, and ensuring your success when it comes to conducting business online.
Posted: 08 Jan 2015 | Published: 10 Jun 2013

Symantec Website Security Solutions

Web Application Security: How to Minimize the Risk of Attacks
sponsored by Qualys
WHITE PAPER: This informative white paper outlines the importance of Web application security. With over 55 percent of vulnerabilities in 2010 resulting in attacks, a solution is necessary. Learn more about the different types of Web application vulnerabilities as well as how to detect vulnerabilities more efficiently.
Posted: 26 Jul 2012 | Published: 26 Jul 2012

Qualys

The 10 myths of safe web browsing
sponsored by Sophos, Inc.
WHITE PAPER: Do you and your users practice safe web browsing? Avoid risky sites? Limit time spent online during work hours? Employ a rock-solid internet access policy? Use a secure browser? Have the experience to know a risky site when you see one? If you answered “Yes” to any of these questions, you need to read the rest of this report.
Posted: 05 Oct 2010 | Published: 04 Oct 2010

Sophos, Inc.

Magic Quadrant for Secure Web Gateway
sponsored by BlueCoat
WHITE PAPER: Web application control and data loss prevention are important considerations for future-proofing investments; however, these features are not very mature or widespread. Read on to learn about a critical tool for protecting endpoints from various forms of malware and other security risks.
Posted: 17 Sep 2010 | Published: 17 Sep 2010

BlueCoat

Web Threats 2010: The Risks Ramp Up
sponsored by CSC
WHITE PAPER: In the face of unprecedented web threat level growth, CSC CloudProtection for Mail and Web delivers protection of the very highest quality for thousands of businesses worldwide. Read this white paper to learn more about today's web threats and how your business can protect itself against them comprehensively and cost-effectively.
Posted: 17 Nov 2010 | Published: 17 Nov 2010

CSC
 
 
XML WEB SERVICES SECURITY DEFINITION (continued): … Web Services Trust Language (WS-Trust) is a specification that uses the secure messaging mechanisms of WS-Security to facilitate trust relationships in diverse Web service environments. WS-Trust is an integral part of the Microsoft model for a standards-based distributed identity infrastructure. WS-Trust also an important element of Windows CardSpace, an interface intended for the exchange of user identity information in Microsoft .Net 3.0.WS-Trust defines a request/response process for the exchange of security tokens in Kerberos, X.509 and SAML (Security Assertion Markup Language). The intent is to ensure operability for the exchange of security information between different technologies, operating systems or domains. WS-Trust allows multiple security tokens to be combined, supporting identification of a service in conjunction with a separate security token for each individual subscriber. WS-Trust can supplement existing security technologies and methods.
XML Web Services Security definition sponsored by SearchSOA.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement