Contents
- XML Security Threat Analysis
- XML Security Analysis Outline
- Broad scope of XML Standards/Protocols
- XML Document Processing Specifications
- XML Web/Repository Specifications
- XML Exchange Specifications
- XML Format-Specific Specifications
- Security-Specific XML Standards/Implementations
- Security-Specific XML Standards/Impl. (contd)
- Use of Other Security Mechanisms
- Categories of XML-related threats
- Categories of XML-related threats (contd)
- Categories of XML-related threats (contd)
- Categories of XML-related threats (contd)
- Categories of XML-related threats (contd)
- Categories of XML-related threats (contd)
- Categories of XML-related threats (contd)
- Specific technologies: SOAP
- Specific technologies: SOAP (contd)
- Specific technologies: Firewalls
- Specific technologies: Firewalls (contd)
- Specific technologies: Registry/Repository
- Specific technologies: Embedded Code
- Areas for Further Investigation
- Thank You
|
Comments or Questions?
Home page
Last updated: March 25, 2002 (Monday)
|