Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Anthony Nadalin"'
This specification defines how a Security Event Token (SET) may be delivered to an intended recipient using HTTP POST. The SET is transmitted in the body of an HTTP POST request to an endpoint operated by the recipient, and the recipient indicates su
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fdf627eb06ba4f6bb265468ce6fb3b93
https://doi.org/10.17487/rfc8935
https://doi.org/10.17487/rfc8935
The Concise Binary Object Representation (CBOR, RFC 7049) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. In CBOR, one po
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0bdcbd42843825dc4768655a3bf297e7
https://doi.org/10.17487/rfc8943
https://doi.org/10.17487/rfc8943
This specification defines a protocol for an HTTP- and JSON- based Security Token Service (STS) by defining how to request and obtain security tokens from OAuth 2.0 authorization servers, including security tokens employing impersonation and delegati
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4c61205e338ecfb28997a2f98c990499
https://doi.org/10.17487/rfc8693
https://doi.org/10.17487/rfc8693
Publikováno v:
IBM Systems Journal. 44:847-867
Business-driven development and management of secure applications and solutions is emerging as a key requirement in the realization of an on demand enterprise. In a given enterprise, individuals acting in various roles contribute to the modeling, dev
Publikováno v:
IBM Systems Journal. 41:228-241
The Web service security challenge is to understand and assess the risk involved in securing a Web-based service today, based on our existing security technology, and at the same time track emerging standards and understand how they will be used to o
Publikováno v:
IBM Systems Journal. 40:130-152
As e-business matures, companies require enterprise-scalable functionality for their corporate Internet and intranet environments. To support the expansion of their computing boundaries, businesses have embraced Web application servers. These servers
Publikováno v:
IBM Systems Journal. 37:349-364
This paper provides a high-level overview of the development and evolution of JavaTM security. Java is a maturing technology that has evolved from its commercial origins as a browser-based scripting tool. We review the various deployment environments
Publikováno v:
IBM Systems Journal. 35:192-203
We briefly review the IBM System Object Model (SOM, incorporated in SOMobjects™) and Distributed SOM (DSOM). We then describe the base DSOM security architecture characterized by the presence of the Object Security Service (OSS) framework in the DS
Publikováno v:
ISSE 2006 — Securing Electronic Busines Processes ISBN: 9783834802132
ISSE
ISSE
Securing applications in a service-oriented architecture is challenging, because the loose coupling that characterizes a SOA can also expose existing security implementations’ brittleness. Our solution includes well-defined trust models based on ac
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::71bd0bfd0ddc8b92b574921e8b7215e1
https://doi.org/10.1007/978-3-8348-9195-2_36
https://doi.org/10.1007/978-3-8348-9195-2_36
Publikováno v:
ACSAC
Java/sup TM/ security technology originally focused on creating a safe environment in which to run potentially untrusted code downloaded from the public network. With the latest release of the Java/sup TM/ platform (the Java/sup TM/ 2 Software Develo