IT Management  >   Systems Operations  >   Security  >   Web Application Security  >  

XML Web Services Security

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Web Services Trust Language (WS-Trust) is a specification that uses the secure messaging mechanisms of WS-Security to facilitate trust relationships in diverse Web service environments. WS-Trust is an integral part of the Microsoft model for a standards-based distributed identity infrastructure. WS-Trust also an important element of Windows CardSpace, an interface intended for the exchange of user  … 
Definition continues below.
XML Web Services Security Reports
 
E-Book: Technical Guide on Web Application Firewalls
sponsored by SearchSecurity.com
EBOOK: Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.
Posted: 04 Nov 2010 | Published: 04 Nov 2010

SearchSecurity.com

Magic Quadrant for Secure Web Gateway
sponsored by BlueCoat
WHITE PAPER: Web application control and data loss prevention are important considerations for future-proofing investments; however, these features are not very mature or widespread. Read on to learn about a critical tool for protecting endpoints from various forms of malware and other security risks.
Posted: 17 Sep 2010 | Published: 17 Sep 2010

BlueCoat

Simplify Security for REST and WS* Web Services: The Gateway Approach
sponsored by Intel
WHITE PAPER: This solution brief presents how to simplify the implementation of standardized enterprise security for both REST and WS-* services, and how a Service Gateway can act as a central Policy Enforcement Point to delegate authentication/authorization and provide REST to SOAP mediations without having to write code.
Posted: 29 Mar 2011 | Published: 28 Mar 2011

Intel

Veracode eLearning Subscription
sponsored by Veracode, Inc.
TRAINING GUIDE: Veracode’s eLearning contains over 30 hours of secure training content in a web-based training module format. The program is designed specifically for developers and security personnel to meet formal training and competency testing requirements. It also contains a comprehensive knowledgebase on secure software development. Read on to learn more.
Posted: 07 May 2010 | Published: 07 May 2010

Veracode, Inc.

Malware Security Report: Protecting Your Business, Customers, and the Bottom Line
sponsored by VeriSign EMEA
WHITE PAPER: This white paper will help you understand the threat from malware and how it can impact your online business. You’ll learn about criminals’ motivations for distributing malware through the web and how they infect web servers to make distribution possible.
Posted: 18 Feb 2011 | Published: 18 Feb 2011

VeriSign EMEA

Malicious JavaScript Attacks: What Can You Do?
sponsored by Sophos, Inc.
WHITE PAPER: We’ll review what to watch for, as well as the security strategies that will help keep you safe.
Posted: 12 Jan 2011 | Published: 11 Jan 2011

Sophos, Inc.

Protecting Against the New Wave of Web Threats
sponsored by BlueCoat
ANALYST REPORT: This Osterman Research White Paper discusses the extent of today's Web threats and provides recommendations on key aspects of a defense against them. It also provides information on Blue Coat's offerings.
Posted: 15 May 2009 | Published: 15 Jan 2009

BlueCoat

Understanding Why Web Application Security is Critical to Business
sponsored by Sirius Computer Solutions
WHITE PAPER: This paper compiles clients’ frequently asked questions about Web application security. These questions are answered by security experts from Sirius and IBM. The goal is to help you understand the issues surrounding Web application security; so you can better prepare your organization for a security breach.
Posted: 13 Oct 2009 | Published: 01 Sep 2009

Sirius Computer Solutions

Cloud Web Security Using Cisco ASA
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive resource examines a cloud web security (CWS) solution that offers a combination of web usage controls with category and reputation-based control, malware filtering, and data protection to address the need for a corporate web security policy.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Cisco Systems, Inc.

Web Application Security: How to Minimize the Risk of Attacks
sponsored by Qualys
WHITE PAPER: This informative white paper outlines the importance of Web application security. With over 55 percent of vulnerabilities in 2010 resulting in attacks, a solution is necessary. Learn more about the different types of Web application vulnerabilities as well as how to detect vulnerabilities more efficiently.
Posted: 26 Jul 2012 | Published: 26 Jul 2012

Qualys
 
 
XML WEB SERVICES SECURITY DEFINITION (continued): … Web Services Trust Language (WS-Trust) is a specification that uses the secure messaging mechanisms of WS-Security to facilitate trust relationships in diverse Web service environments. WS-Trust is an integral part of the Microsoft model for a standards-based distributed identity infrastructure. WS-Trust also an important element of Windows CardSpace, an interface intended for the exchange of user identity information in Microsoft .Net 3.0.WS-Trust defines a request/response process for the exchange of security tokens in Kerberos, X.509 and SAML (Security Assertion Markup Language). The intent is to ensure operability for the exchange of security information between different technologies, operating systems or domains. WS-Trust allows multiple security tokens to be combined, supporting identification of a service in conjunction with a separate security token for each individual subscriber. WS-Trust can supplement existing security technologies and methods.
XML Web Services Security definition sponsored by SearchMicroservices.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement