![Cryptographic protocols / Cryptography standards / Internet standards / WS-Security / Generic Security Services Application Program Interface / Kerberos / SPNEGO / Web Services Security Kerberos Binding / WS-SecureConversation / Computing / Computer security / Security Cryptographic protocols / Cryptography standards / Internet standards / WS-Security / Generic Security Services Application Program Interface / Kerberos / SPNEGO / Web Services Security Kerberos Binding / WS-SecureConversation / Computing / Computer security / Security](https://www.pdfsearch.io/img/03480fddd4202aa9ad386edff9f48a75.jpg)
| Document Date: 2003-12-27 07:59:04 Open Document File Size: 775,94 KBShare Result on Facebook
Company Microsoft Corporation / IBM Corporation / / IndustryTerm security infrastructure / Web service security specifications / Web services security mechanism / Web Services Security Kerberos Binding Specification / pre-defined signature algorithms / Web Services Security Kerberos / abstracted security protocols / acceptable algorithms / cryptographic algorithms / wire protocol / signature algorithm / Web service security architecture / Web Service Security Usage / Web services security model / encryption algorithm / Web service usage / Web Services security specifications / security protocols / Web services security / Web services / / Person Brendan Dixon / Maryann Hondo / Anthony Nadalin / Kerberos Interoperability / Chris Kaler / Hiroshi Maruyama / / Position actor / General / / Product Microsoft Corporation Portable Audio Device / / ProgrammingLanguage XML / / PublishedMedium inside SOAP / / Technology pre-defined signature algorithms / Encryption / XML / specific algorithms / abstracted security protocols / encryption algorithm / wire protocol / XML Encryption / acceptable algorithms / API / PKI / signature algorithm / http / security protocols / underlying protocol / cryptographic algorithms / Using XML Encryption / negotiating the cryptographic algorithms / / URL http /
SocialTag |