Research Output
Advanced security and network forensics: web Infrastructures.
  5 WEB INFRASTRUCTURES
5.1 Objectives
5.2 Introduction
5.3 Identity 2.0
5.4 SOAP over HTTP
5.5 LDAP
X.500
5.6 Authentication Infrastructures
5.7 802.1x Authentication Infrastructure
Authentication techniques
Security weaknesses of RADIUS
5.8 OpenID
5.9 Kerberos
Microsoft CardSpace
5.10 WS-*
5.6.1 SAML
5.11 Access Control
5.10.1 XACML
5.12 Tutorial

  • Type:

    Teaching Resource

  • Date:

    25 January 2011

  • Publication Status:

    Published

  • Library of Congress:

    QA75 Electronic computers. Computer science

  • Dewey Decimal Classification:

    005.8 Data security

Citation

Buchanan, W. J. (2011). Advanced security and network forensics: web Infrastructures. Edinburgh Napier University

Authors

Keywords

Web infrastructures; web-based architectures; authentication; access control; LDAP;

Monthly Views:

Available Documents