Research Output

Advanced security and network forensics: web Infrastructures.

  5 WEB INFRASTRUCTURES
5.1 Objectives
5.2 Introduction
5.3 Identity 2.0
5.4 SOAP over HTTP
5.5 LDAP
X.500
5.6 Authentication Infrastructures
5.7 802.1x Authentication Infrastructure
Authentication techniques
Security weaknesses of RADIUS
5.8 OpenID
5.9 Kerberos
Microsoft CardSpace
5.10 WS-*
5.6.1 SAML
5.11 Access Control
5.10.1 XACML
5.12 Tutorial

  • Publication Status:

    Published

  • Library of Congress:

    QA75 Electronic computers. Computer science

  • Dewey Decimal Classification:

    005.8 Data security

Citation

Buchanan, W. J. Advanced security and network forensics: web Infrastructures.

Authors

Keywords

Web infrastructures; web-based architectures; authentication; access control; LDAP;

Available Documents