Preface |
|
ix | |
In Gratitude |
|
xi | |
Chapter 1 Introduction |
|
1 | (2) |
Chapter 2 Four Kinds Of Architectures |
|
3 | (62) |
|
|
3 | (1) |
|
|
4 | (5) |
|
2.3 Software Architectures |
|
|
9 | (13) |
|
|
10 | (3) |
|
|
13 | (2) |
|
|
15 | (1) |
|
|
16 | (3) |
|
|
19 | (1) |
|
2.3.6 Communications and Messaging |
|
|
20 | (1) |
|
|
21 | (1) |
|
2.4 Service-Oriented Architecture |
|
|
22 | (8) |
|
2.4.1 Distributed Computing and Services |
|
|
23 | (2) |
|
2.4.2 Process-Oriented SOA |
|
|
25 | (2) |
|
2.4.3 Web Services or an Externally Focused SOA |
|
|
27 | (3) |
|
2.4.4 Enterprise Service Bus |
|
|
30 | (1) |
|
2.5 Security Architecture |
|
|
30 | (31) |
|
2.5.1 Construction of a Security Architecture |
|
|
33 | (1) |
|
|
34 | (2) |
|
2.5.3 Organization and Management |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
2.5.6 Information Classification |
|
|
39 | (2) |
|
2.5.7 Identity Management |
|
|
41 | (3) |
|
2.5.8 Security Awareness and Training |
|
|
44 | (1) |
|
|
44 | (1) |
|
2.5.10 Communications and Operations Management |
|
|
45 | (1) |
|
2.5.11 Perimeters and Partitioning |
|
|
46 | (2) |
|
|
48 | (1) |
|
|
48 | (2) |
|
|
50 | (1) |
|
2.5.15 Separation of Duties |
|
|
51 | (1) |
|
2.5.16 Principles of Least Privilege and Least Authority |
|
|
51 | (1) |
|
2.5.17 Systems Acquisition, Development, and Maintenance |
|
|
52 | (1) |
|
2.5.18 Confidentiality Models |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
2.5.21 Service Clark—Wilson Integrity Model |
|
|
54 | (4) |
|
2.5.22 Security Assessments and Audits |
|
|
58 | (1) |
|
2.5.23 Incident Management |
|
|
58 | (1) |
|
2.5.24 Business Continuity |
|
|
59 | (1) |
|
|
60 | (1) |
|
|
61 | (4) |
Chapter 3 Implementing And Securing SOA |
|
65 | (184) |
|
|
65 | (1) |
|
3.2 Extensible Markup Language |
|
|
66 | (21) |
|
|
68 | (6) |
|
3.2.1.1 XML Digital Signature |
|
|
68 | (6) |
|
|
74 | (5) |
|
|
79 | (3) |
|
|
79 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
80 | (2) |
|
|
82 | (1) |
|
3.2.4.1 A Database Query Language for XML |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
84 | (3) |
|
|
87 | (12) |
|
3.3.1 SOAP Roles and Nodes |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
93 | (2) |
|
|
95 | (4) |
|
|
99 | (96) |
|
|
107 | (9) |
|
|
116 | (13) |
|
3.4.3 WS-SecureConversation |
|
|
129 | (4) |
|
3.4.4 WS-Privacy and the P3P Framework |
|
|
133 | (11) |
|
|
135 | (9) |
|
|
144 | (29) |
|
|
153 | (9) |
|
|
162 | (11) |
|
3.4.6 Authorization without WS-Federation |
|
|
173 | (5) |
|
|
178 | (5) |
|
3.4.8 WS-ReliableMessaging |
|
|
183 | (8) |
|
|
191 | (2) |
|
|
193 | (2) |
|
|
195 | (49) |
|
|
197 | (8) |
|
|
205 | (9) |
|
3.5.2.1 Assertion Query and Request Protocol |
|
|
207 | (2) |
|
3.5.2.2 Authentication Request Protocol |
|
|
209 | (3) |
|
3.5.2.3 Artifact Resolution Protocol |
|
|
212 | (1) |
|
3.5.2.4 Name Identifier Management Protocol |
|
|
212 | (1) |
|
3.5.2.5 Single-Logout Protocol |
|
|
213 | (1) |
|
3.5.2.6 Name Identifier Mapping Protocol |
|
|
214 | (1) |
|
3.5.3 Authentication Context |
|
|
214 | (4) |
|
|
218 | (8) |
|
|
226 | (3) |
|
|
229 | (11) |
|
|
240 | (1) |
|
3.5.8 Security and Privacy Considerations |
|
|
241 | (3) |
|
|
244 | (2) |
|
|
246 | (1) |
|
|
246 | (3) |
Chapter 4 WEB 2.0 |
|
249 | (4) |
|
|
249 | (1) |
|
|
250 | (1) |
|
|
251 | (2) |
Chapter 5 Other SOA Platforms |
|
253 | (18) |
|
|
253 | (1) |
|
|
253 | (1) |
|
|
254 | (1) |
|
|
255 | (1) |
|
5.5 .Net Passport, Windows LiveID |
|
|
256 | (1) |
|
|
257 | (14) |
Chapter 6 Auditing Service-Oriented Architectures |
|
271 | (20) |
|
|
272 | (19) |
|
|
272 | (5) |
|
|
277 | (1) |
|
6.1.3 Attacking Authentication |
|
|
278 | (6) |
|
6.1.4 Attacking Authorization |
|
|
284 | (2) |
|
6.1.5 Denial-of-Service Attacks |
|
|
286 | (1) |
|
|
286 | (2) |
|
6.1.7 Malicious Use of Service or Logic Attacks |
|
|
288 | (1) |
|
6.1.8 Poisoning XML Schemas |
|
|
289 | (2) |
Chapter 7 Defending And Detecting Attacks |
|
291 | (6) |
|
|
291 | (3) |
|
7.2 Firewalls, IDS, and IPS |
|
|
294 | (3) |
Chapter 8 Architecture |
|
297 | (20) |
|
|
297 | (3) |
|
|
300 | (5) |
|
|
305 | (2) |
|
|
307 | (10) |
Bibliography |
|
317 | (6) |
Index |
|
323 | |