XML Security Threat Analysis

Start Here


Contents

  1. XML Security Threat Analysis

  2. XML Security Analysis Outline

  3. Broad scope of XML Standards/Protocols

  4. XML Document Processing Specifications

  5. XML Web/Repository Specifications

  6. XML Exchange Specifications

  7. XML Format-Specific Specifications

  8. Security-Specific XML Standards/Implementations

  9. Security-Specific XML Standards/Impl. (contd)

  10. Use of Other Security Mechanisms

  11. Categories of XML-related threats

  12. Categories of XML-related threats (contd)

  13. Categories of XML-related threats (contd)

  14. Categories of XML-related threats (contd)

  15. Categories of XML-related threats (contd)

  16. Categories of XML-related threats (contd)

  17. Categories of XML-related threats (contd)

  18. Specific technologies: SOAP

  19. Specific technologies: SOAP (contd)

  20. Specific technologies: Firewalls

  21. Specific technologies: Firewalls (contd)

  22. Specific technologies: Registry/Repository

  23. Specific technologies: Embedded Code

  24. Areas for Further Investigation

  25. Thank You


Comments or Questions?

Home page

Last updated:
March 25, 2002 (Monday)

Created with Corel Presentations