Container Format Specification. Version Page i
|
|
|
- Clement French
- 9 years ago
- Views:
Transcription
1 Container Format Specification Version Page i
2 Table of contents 1 Introduction Referenced documents Abbreviations Container format Construction of the container header Construction of the container body XML example Page ii
3 List of tables Table 1: Structural information in the container model... 7 Table 2: Characteristics type attribute V List of figures Figure 1: Overview Container Model... 2 Figure 2: Container model - Header Element Structure... 4 Figure 3: Construction Timestamp Element... 5 Figure 4: Structure of the signature element... 6 Figure 5: Structure of the XML element... 8 Figure 6: Structure of the binary element... 8 Figure 7: Container model - Body Element Structure Page iii
4 1 Introduction 1.1 Referenced documents [Source] [DatexIISchema] [WS Security Core Specification 1.1] Publisher Schema of Datex II V2.0 specification OASIS Standard 1.1: WS-Security Core Specification open.org/committees/download.php/16790/wss-v1.1- spec-os-soapmessagesecurity.pdf 1.2 Abbreviations Abbreviation MDM MDM Platform XML XSD Description Mobility Data Marketplace Mobility Data Marketplace platform extensible Markup Language XML Schema Definition Page 1
5 2 Container format The container format of the mobility data marketplace is an XML data exchange format that is defined using an XML Schema Definition (XSD). It is divided into the area of MDM platform-specific information (header element) and the payload area (body element). This format definition allows to carry any structured traffic data by using the MDM platform. Figure 1: Overview Container Model In the header element the container format includes - depending on the type of use - the ID of the publication under which the data is made available to the MDM platform, or the ID of the subscription under which the data are sent to the data client. Furthermore, the header element optionally contains digital signatures and timestamps for the included payload. In the container format, exactly one header element is permitted. The payload is stored in the body element of the container. In order to keep the model flexible, the format and content of the body element is not specified. The children of the body element contain an additional mark of the content type. In a container, there is exactly one body element. Thus, not only data in XML format can be transported in containers, but also binary data. It is also possible to transport more than just one data packet (i.e. several children in the body element) in a container using this model. Page 2
6 2.1 Construction of the container header The metadata for the transmitted payload is stored in the header element. The structure of this information is based on the [WS Security Core Specification 1.1] for the construction of a SOAP header. The header includes elements consisting of information about the data origin, the validity and the signature of the payload. In addition, a status code can be transmitted. The origin of a message is characterized by the publication ID under which the publication of the data supplier is registered, or the subscription ID under which the subscription of the data client is registered. The elements on the validity and the signature of the data packets may occur 0 to n times. If multiple data packets are contained in the body, each package can then be provided with a validity and a signature. For detailed information, please refer to chapter 2.2. Page 3
7 Figure 2: Container model - Header Element Structure Page 4
8 Figure 3: Construction Timestamp Element The timestamp element is part of the OASIS specification [WS Security Core Specification 1.1] of the OASIS standard 1.1 and defines the time of creation as well as the validity period of data. Page 5
9 Figure 4: Structure of the signature element The signature element is also part of the OASIS specification [WS Security Core Specification 1.1] of the OASIS standard 1.1 and defines the originator of the payload. In addition, the signature ensures that the payload has not been manipulated (data integrity). If the element exists, only the value "OK" will be allowed as status code in version 1.0. Other status codes may be supplemented in future releases. The encryption of the message content is not provided, as the message is sent SSLencrypted across the entire route of transmission. An asymmetric encryption of the message content is not useful, as it would require an extensive key management from the MDM platform, to enable the data suppliers, when creating and sending a data packet to the platform, to identify the public keys of the data clients. Within the MDM platform, it must be assumed that the data is made available to authorized data clients only. Page 6
10 Information Identifier Description Contains information to identify the origin of data Publication ID Subscription ID Validity Information on the validity period of data Date and time of creation Date and time of expiry Reference to the data for which the validity is determined Signature Information on the signature of data Type of signature Reference to the signed data Status For transferring a status code Table 1: Structural information in the container model 2.2 Construction of the container body In a container, there is exactly one body element. Below this element, as many xml and binary elements can be grouped. They host the actual payload. Page 7
11 Figure 5: Structure of the XML element If the payload is provided in an XML-based format, they will then be installed below the XML element. The scheme attribute makes reference to an XSD schema belonging to the XML structure. This XSD schema can be used to validate the data. The id attribute assigns the payload to a unique ID that is referenced by the header elements timestamp and signature. Figure 6: Structure of the binary element If the payload is provided as binary data, the latter will be installed under the binary element in BASE64-encoded form. The type attribute indicates the type of data. The id attribute assigns the payload to a unique ID that is referenced by the header elements timestamp and signature. Page 8
12 Type base64binarydatex2 base64binaryots2 hexbinary Todo Description Base64-encoded data according to [DatexIISchema]. Base64-encoded data according to Open Transport System 2. Binary data in hexadecimal notation. The type of data must be part of the coded data. Placeholder for further formats Table 2: Characteristics type attribute V1.0 A signature and a validity that are defined in the header element may belong to each of the xml and binary elements. For this purpose, the corresponding XML / binary element is assigned an ID that is referenced in the signature / timestamp element of the header. Page 9
13 If the entire content of the body element is provided with a signature or a validity, it must be encoded by using the ID "body" in the header elements. The body element itself must then be assigned no ID. Figure 7: Container model - Body Element Structure Page 10
14 2.3 XML example The example shows a container with two data packets in the body and a header with a time stamp for the entire body. All information is fictional. <?xml version="1.0" encoding="utf-8" standalone="yes"?> <ns3:container xmlns:ns1=" xmlns:ns2=" xmlns:ns3=" <ns3:header> <ns3:identifier> <ns3:publicationid> </ns3:publicationid> </ns3:identifier> <ns1:timestamp ns1:id="body"> <ns1:created> t12:28:01.874z</ns1:created> <ns1:expires> t12:28:01.874z</ns1:expires> </ns1:timestamp> </ns3:header> <ns3:body> <ns3:binary type="base64binarydatex2" id="b1"> H4sIAAAAAAAAAN19245dx5HluwH/A8EXPwxCjMiMvBVkNfI604A1Y0xrBvM2oMWymmiKNCi6bf/9 RBYtdW225e4d3EzmHMOWi6oL1z61TtxjxZf/8OfvXz351/u3P7x88/rXv6Iv8FdP7l9/++bFy9ff /fpx/+ubaffx//dvl3/x5qvzmzffvfz2+auv37y4f/vevuv1d79++s/v3v3h7tmz79/98c//+pr3 b95+//yd/jxnp3z7z/ffp3+gbpo/+psxv3j/dxd//uhlt9/0pz/96ys/2s/evp3umugkz//n69/8 08P3wcvXP7x7/vrbe/k++Ya79z/tN2++ffjh/9m/9Mn44/2r3759+e39b//4u1cv33 </ns3:binary> <ns3:binary type="base64binarydatex2" id="b2"> RBYtdW225e4d3EzmHMOWi6oL1z61TtxjxZf/8OfvXz351/u3P7x88/rXv6Iv8FdP7l9/++bFy9ff H4sIAAAAAAAAAN19245dx5HluwH/A8EXPwxCjMiMvBVkNfI604A1Y0xrBvM2oMWymmiKNCi6bf/9 /fpx/+ubaffx//dvl3/x5qvzmzffvfz2+auv37y4f/vevuv1d79++s/v3v3h7tmz79/98c//+pr3 08P3wcvXP7x7/vrbe/k++Ya79z/tN2++ffjh/9m/9Mn44/2r3759+e39b//4u1cv33/z//3XHz/9 b95+//yd/jxnp3z7z/ffp3+gbpo/+psxv3j/dxd//uhlt9/0pz/96ys </ns3:binary> </ns3:body> </ns3:container> Page 11
Technical Interface Description
Technical Interface Description Version 2.4.1 28.04.2015 Table of Contents 1 Introduction... 6 1.1 Preamble... 6 1.2 Structure of the Document... 6 1.3 Referenced Documents... 7 1.4 List of Abbreviations...
Mobility Data Marketplace The German approach for the exchange of dynamic traffic data
Mobility Data Marketplace The German approach for the exchange of dynamic traffic data Lutz Rittershaus Federal Highway Research Institute www.easyway-its.eu History Innovation Program of the German Federal
Model User Guide for Implementing Online Insurance Verification
Model User Guide for Implementing Online Insurance Verification Using Web services to verify auto insurance coverage Version 3.0 May 8, 2008 Executive Summary IICMVA s Model User Guide for Implementing
Direct message exhange with Finnish Customs
Direct message exhange with Finnish Customs Technical guidebook Finnish Customs Uppdated 20 August 2015 Message Exhange Support Message exchange with Finnish Customs, Technical guidebook, updated 20 August
The Global Justice Reference Architecture (JRA) Web Services Service Interaction Profile
The Global Justice Reference Architecture (JRA) Web Services Service Interaction Profile V 1.1 by The Global Infrastructure/Standards Working Group August 1, 2007 Table of Contents Acknowledgements...
Copyright 2012, Oracle and/or its affiliates. All rights reserved.
1 OTM and SOA Mark Hagan Principal Software Engineer Oracle Product Development Content What is SOA? What is Web Services Security? Web Services Security in OTM Futures 3 PARADIGM 4 Content What is SOA?
This Working Paper provides an introduction to the web services security standards.
International Civil Aviation Organization ATNICG WG/8-WP/12 AERONAUTICAL TELECOMMUNICATION NETWORK IMPLEMENTATION COORDINATION GROUP EIGHTH WORKING GROUP MEETING (ATNICG WG/8) Christchurch New Zealand
Securing Web Services Using Microsoft Web Services Enhancements 1.0. Petr PALAS PortSight Software Architect [email protected] www.portsight.
Securing Web Services Using Microsoft Web Services Enhancements 1.0 Petr PALAS PortSight Software Architect [email protected] www.portsight.com Agenda What is WSE and Its Relationship to GXA Standards
Digital Signature Web Service Interface
1 2 Digital Signature Web Service Interface 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 1 Introduction This document describes an RPC interface for a centralized
Developer Guide to Authentication and Authorisation Web Services Secure and Public
Government Gateway Developer Guide to Authentication and Authorisation Web Services Secure and Public Version 1.6.3 (17.04.03) - 1 - Table of Contents Government Gateway 1 Developer Guide to Authentication
XML Signatures in an Enterprise Service Bus Environment
XML Signatures in an Enterprise Bus Environment Eckehard Hermann Research & Development XML Integration Uhlandstraße 12 64297 Darmstadt, Germany [email protected] Dieter Kessler Research
EMS E-COMMERCE GATEWAY API TECHNICAL INSTALLATION MANUAL FEBRUARY 2016
EMS E-COMMERCE GATEWAY API TECHNICAL INSTALLATION MANUAL FEBRUARY 2016 CONTENTS 1 Introduction 6 2 Artefacts You Need 7 3 How the API works 8 4 Sending transactions to the gateway 10 5 Building Transactions
Web Service Security Vulnerabilities and Threats in the Context of WS-Security
Web Service Security Vulnerabilities and Threats in the Context of WS-Security Jesper Holgersson Eva Söderström University of Skoevde, Sweden SIIT 2005, ITU, Geneva, September 2005 Outline of presentation
e-filing Secure Web Service User Manual
e-filing Secure Web Service User Manual Page1 CONTENTS 1 BULK ITR... 6 2 BULK PAN VERIFICATION... 9 3 GET ITR-V BY TOKEN NUMBER... 13 4 GET ITR-V BY ACKNOWLEDGMENT NUMBER... 16 5 GET RETURN STATUS... 19
HexaCorp. White Paper. SOA with.net. Ser vice O rient ed Ar c hit ecture
White Paper SOA with.net Ser vice O rient ed Ar c hit ecture Introduction SOA, a rich technology foundation designed for building distributed service-oriented applications for the enterprise and the web
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
Secure Authentication and Session. State Management for Web Services
Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively
Real-Time Connectivity Specifications For. 270/271 and 276/277 Inquiry Transactions. United Concordia Dental (UCD)
Real-Time Connectivity Specifications For 270/271 and 276/277 Inquiry Transactions United Concordia Dental (UCD) May 15, 2015 1 Contents 1. Overview 2. Trading Partner Requirements 3. Model SOAP Messages
Corporate Access File Transfer Service Description Version 1.0 01/05/2015
Corporate Access File Transfer Service Description Version 1.0 01/05/2015 This document describes the characteristics and usage of the Corporate Access File Transfer service, which is for transferring
Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems
Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems If company want to be competitive on global market nowadays, it have to be persistent on Internet. If we
Standard Recommended Practice extensible Markup Language (XML) for the Interchange of Document Images and Related Metadata
Standard for Information and Image Management Standard Recommended Practice extensible Markup Language (XML) for the Interchange of Document Images and Related Metadata Association for Information and
Management and Web service Management
Management and Web service Management This presentation offers work to OASIS completed by IBM with contribution from CA and Talking Blocks The work details a frame of reference for Management Applications,
igovt logon service Context Mapping Service (icms) Messaging Specification Release 9.6
igovt logon service Context Mapping Service (icms) Messaging Specification Release 9.6 Subject Client Author Context Mapping Service Messaging Specification for the igovt logon service The Department of
EUR-Lex 2012 Data Extraction using Web Services
DOCUMENT HISTORY DOCUMENT HISTORY Version Release Date Description 0.01 24/01/2013 Initial draft 0.02 01/02/2013 Review 1.00 07/08/2013 Version 1.00 -v1.00.doc Page 2 of 17 TABLE OF CONTENTS 1 Introduction...
17 March 2013 NIEM Web Services API Version 1.0 URI: http://reference.niem.gov/niem/specification/web-services-api/1.0/
17 March 2013 NIEM Web Serv vices API Version 1.0 URI: http://reference.niem.gov/niem/specification/web-services-api/1.0/ i Change History No. Date Reference: All, Page, Table, Figure, Paragraph A = Add.
CONTRACT MODEL IPONZ DESIGN SERVICE VERSION 2. Author: Foster Moore Date: 20 September 2011 Document Version: 1.7
CONTRACT MODEL IPONZ DESIGN SERVICE VERSION 2 Author: Foster Moore Date: 20 September 2011 Document Version: 1.7 Level 6, Durham House, 22 Durham Street West PO Box 106857, Auckland City Post Shop, Auckland
Mobility Information Series
SOAP vs REST RapidValue Enabling Mobility XML vs JSON Mobility Information Series Comparison between various Web Services Data Transfer Frameworks for Mobile Enabling Applications Author: Arun Chandran,
02267: Software Development of Web Services
02267: Software Development of Web Services Week 11 Hubert Baumeister [email protected] Department of Applied Mathematics and Computer Science Technical University of Denmark Fall 2015 1 Contents WS-Policy Web
[MS-ASMS]: Exchange ActiveSync: Short Message Service (SMS) Protocol
[MS-ASMS]: Exchange ActiveSync: Short Message Service (SMS) Protocol Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications
SAP HANA Cloud Integration CUSTOMER
CUSTOMER Table of Contents 1 Introduction.... 3 2 from a Bird s Eye Perspective....4 3 Integration Capabilities....5 4 Connectivity Options....7 5 Using Predefined Integration Content....8 6 Security....
Key Management and Distribution
and Distribution CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 January 2011 CSS322Y10S2L12, Steve/Courses/CSS322/Lectures/key.tex,
Foreign Account Tax Compliance Act (FATCA) Foreign Account Tax Compliance Act (FATCA) FATCA Reports
Foreign Account Tax Compliance Act (FATCA) August 2015 Foreign Account Tax Compliance Act (FATCA) FATCA Reports International Compliance Management Model (ICMM) Notifications User Guide FATCA Reports Foreign
NEMSIS v3 Web Services Guide
NEMSIS TAC Whitepaper NEMSIS v3 Web Services Guide Date November 2, 2011 November 14, 2011 (FINAL) April 24, 2012 (Updated) May 09, 2012 (Updated) August 27, 2012 (updated) September 13, 2012 (updated)
Most common problem situations in direct message exchange
Page 1 / 7 Message Exchange Direct Message Exchange Most common problem situations in direct message exchange v. 1.0, 11.8.2014 Page 2 / 7 Most common problem situations in direct message exchange This
Oracle Application Server 10g Web Services Frequently Asked Questions Oct, 2006
Oracle Application Server 10g Web Services Frequently Asked Questions Oct, 2006 This FAQ addresses frequently asked questions relating to Oracle Application Server 10g Release 3 (10.1.3.1) Web Services
Run-time Service Oriented Architecture (SOA) V 0.1
Run-time Service Oriented Architecture (SOA) V 0.1 July 2005 Table of Contents 1.0 INTRODUCTION... 1 2.0 PRINCIPLES... 1 3.0 FERA REFERENCE ARCHITECTURE... 2 4.0 SOA RUN-TIME ARCHITECTURE...4 4.1 FEDERATES...
EP 2 365 669 A1 (19) (11) EP 2 365 669 A1 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: 14.09.2011 Bulletin 2011/37
(19) (12) EUROPEAN PATENT APPLICATION (11) EP 2 36 669 A1 (43) Date of publication: 14.09.11 Bulletin 11/37 (1) Int Cl.: H04L 12/8 (06.01) (21) Application number: 00243.6 (22) Date of filing:.03. (84)
Federated Identity Management Solutions
Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
OSCI Transport 1.2 Specification Status: FINAL OSCI Leitstelle
OSCI Transport 1.2 Specification Status: FINAL OSCI Leitstelle Bremen/Germany, June 2002 OSCI Transport 1.2 2 The following companies and institutions have been involved in the creation of this specification:
Rotorcraft Health Management System (RHMS)
AIAC-11 Eleventh Australian International Aerospace Congress Rotorcraft Health Management System (RHMS) Robab Safa-Bakhsh 1, Dmitry Cherkassky 2 1 The Boeing Company, Phantom Works Philadelphia Center
Web Services Trust and XML Security Standards
Web Services Trust and XML Security Standards Date: April 9, 2001 Version: 1.0 Copyright 2001-2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States
European Commission e-trustex Software Architecture Document
EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATICS Information systems Directorate European Commission e-trustex Software Architecture Document Date: 03/11/2014 Version: 2.1 Authors: Sandro D'Orazio,
Introduction to UDDI: Important Features and Functional Concepts
: October 2004 Organization for the Advancement of Structured Information Standards www.oasis-open.org TABLE OF CONTENTS OVERVIEW... 4 TYPICAL APPLICATIONS OF A UDDI REGISTRY... 4 A BRIEF HISTORY OF UDDI...
Structured Data Capture (SDC) Trial Implementation
Integrating the Healthcare Enterprise 5 IHE Quality, Research, and Public Health Technical Framework Supplement 10 Structured Data Capture (SDC) 15 Trial Implementation 20 Date: October 27, 2015 Author:
Presentation / Interface 1.3
W3C Recommendations Mobile Web Best Practices 1.0 Canonical XML Version 1.1 Cascading Style Sheets, level 2 (CSS2) SPARQL Query Results XML Format SPARQL Protocol for RDF SPARQL Query Language for RDF
Overview: FedPayments Reporter Interface to Online Banking Cash Management Systems
Overview: FedPayments Reporter Interface to Online Banking Cash Management Systems Revised 9/16/2015 Contents Brief FedPayments Reporter Service Overview Interface with online banking cash management systems
AS4: Web Services for B2B. GS1 etg White Paper. Issue 1, Approved, July 2011. AS4: Web Services for B2B GS1 etg White Paper
AS4: Web Services for B2B GS1 etg White Paper Issue 1, Approved, July 2011 Issue 1, Approved, July 2011 All contents copyright GS1 Page 1 of 14 Document Summary Document Item Document Title Current Value
Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy [email protected] CTO, Forum Systems
Core Feature Comparison between XML / SOA Gateways and Web Application Firewalls Jason Macy [email protected] CTO, Forum Systems XML Gateway vs Competitive XML Gateways or Complementary? and s are Complementary
Attachment 6 - Email Interface For External Systems Wersja: 4.0
MINISTRY OF FINANCE SYSTEM INTEGRATION PLAN ATTACHMENT 6 SEAP SPECIFICATION EMAIL INTERFACE FOR EXTERNAL SYSTEMS PROJECT ECIP/SEAP VERSION 1 z 15 Table of Contents 1. Email Interface for External
PeopleTools 8.55: Reporting Web Services
PeopleTools 8.55: Reporting Web Services December 2015 PeopleTools 8.55: Reporting Web Services CDSKU pt855pbr0_r02 Copyright 1988, 2015, Oracle and/or its affiliates. All rights reserved. License Restrictions
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
FICOM S (THE FINNISH FEDERATION FOR TELECOMMUNICATIONS AND TELEINFORMATICS) APPLICATION GUIDELINE FOR ETSI S MSS STANDARDS: V2.
FICOM S (THE FINNISH FEDERATION FOR TELECOMMUNICATIONS AND TELEINFORMATICS) APPLICATION GUIDELINE FOR ETSI S MSS STANDARDS: V2.1 2012-01-14 Version Description 1.0 Original version. 1.1 The MSS_Signature
Web Services Technologies
Web Services Technologies XML and SOAP WSDL and UDDI Version 16 1 Web Services Technologies WSTech-2 A collection of XML technology standards that work together to provide Web Services capabilities We
Java Security Web Services Security (Overview) Lecture 9
Java Security Web Services Security (Overview) Lecture 9 Java 2 Cryptography Java provides API + SPI for crypto functions Java Cryptography Architecture Security related core classes Access control and
Web Services Security SOAP Messages with Attachments (SwA) Profile 1.1
1 2 3 4 Web Services Security SOAP Messages with Attachments (SwA) Profile 1.1 OASIS Standard, 1 February 2006 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Document identifier:
MINISTRY OF FINANCE SYSTEM INTEGRATION PLAN ATTACHMENT NR 2 SEAP XML SPECIFICATION WEBSERVICE INTERFACE FOR EXTERNAL SYSTEMS PROJECT ECIP/SEAP
MINISTRY OF FINANCE SYSTEM INTEGRATION PLAN ATTACHMENT NR 2 SEAP XML SPECIFICATION WEBSERVICE INTERFACE FOR EXTERNAL SYSTEMS PROJECT ECIP/SEAP VERSION 1 z 26 Table of Contents 1. WebService Interface
Improving performance for security enabled web services. - Dr. Colm Ó héigeartaigh
Improving performance for security enabled web services - Dr. Colm Ó héigeartaigh Agenda Introduction to Apache CXF WS-Security in CXF 3.0.0 Securing Attachments in CXF 3.0.0 RS-Security in CXF 3.0.0 Some
United Concordia (UCD) Real Time Claim Submission & Adjudication Connectivity Specifications
United Concordia (UCD) Real Time Claim Submission & Adjudication Connectivity Specifications May 15, 2015 Contents 1. Real Time Overview 2. Requirements 3. SOAP Messages 4. SOAP Faults 5. CORE-Compliant
Securing Web Services From Encryption to a Web Service Security Infrastructure
Securing Web Services From Encryption to a Web Service Security Infrastructure Kerberos WS-Security X.509 TLS Gateway OWSM WS-Policy Peter Lorenzen WS-Addressing Agent SAML Policy Manager Technology Manager
Server based signature service. Overview
1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...
Semester Thesis Traffic Monitoring in Sensor Networks
Semester Thesis Traffic Monitoring in Sensor Networks Raphael Schmid Departments of Computer Science and Information Technology and Electrical Engineering, ETH Zurich Summer Term 2006 Supervisors: Nicolas
WEB SERVICES SECURITY
WEB SERVICES SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
TIB 2.0 Administration Functions Overview
TIB 2.0 Administration Functions Overview Table of Contents 1. INTRODUCTION 4 1.1. Purpose/Background 4 1.2. Definitions, Acronyms and Abbreviations 4 2. OVERVIEW 5 2.1. Overall Process Map 5 3. ADMINISTRATOR
Voice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
Message exchange with. Finnish Customs
Message exchange with Finnish Customs Introduction to message exchange with Finnish Customs Finnish Customs 3.6.2015 Message Exchange Support Contents Introduction... 3 1 Electronic services of Finnish
Outage Notification. "Acknowledgment: This material is based upon work supported by the Department of Energy under Award Number DE-OE0000193.
Outage Notification "Acknowledgment: This material is based upon work supported by the Department of Energy under Award Number DE-OE0000193." Disclaimer: "This report was prepared as an account of work
PROTOTYPE IMPLEMENTATION OF A DEMAND DRIVEN NETWORK MONITORING ARCHITECTURE
PROTOTYPE IMPLEMENTATION OF A DEMAND DRIVEN NETWORK MONITORING ARCHITECTURE Augusto Ciuffoletti, Yari Marchetti INFN-CNAF (Italy) Antonis Papadogiannakis, Michalis Polychronakis FORTH (Greece) Summary
PowerCenter Real-Time Development
PowerCenter Real-Time Development Brian Bunn, Project Manager Serco Jay Moles, Sr. Informatica Designer Serco Tom Bennett, Sr. Consultant Informatica 1 Agenda Overview of PowerCenter Web Services Error
OKLAHOMA TAX COMMISSION
OKLAHOMA TAX COMMISSION Modernized e-file Handbook for Tax Practitioners, EROs, Transmitters, and Software Developers Corporate Income Tax (Form 512) Small Business Corporate Income Tax (Form 512-S) Partnership
Trade Software Developer Technical Seminar Document Imaging System Celestine Harrell Shailesh Sardesai. March 7, 2012
Trade Software Developer Technical Seminar Document Imaging System Celestine Harrell Shailesh Sardesai March 7, 2012 Document Image System Overview The Document Imaging System (DIS) facilitates automated
WebService Security. A guide to set up highly secured client-server communications using WS-Security extensions to the SOAP protocol
WebService Security A guide to set up highly secured client-server communications using WS-Security extensions to the SOAP protocol Jam Hamidi Senior Technical Analyst BCcampus, Victoria, British Columbia,
Multiple electronic signatures on multiple documents
Multiple electronic signatures on multiple documents Antonio Lioy and Gianluca Ramunno Politecnico di Torino Dip. di Automatica e Informatica Torino (Italy) e-mail: [email protected], [email protected] web
Media Object Server (MOS ) Protocol v3.8.3 Web Services
Media Object Server (MOS ) Protocol v3.8.3 Web Services MOS Protocol version 3.8.3 Document Revision 10 Revision Date: Monday, October 09, 2006 Copyright Notice Copyright 2000, 2001, 2002, 2003, 2004,
Den Gode Webservice - Security Analysis
Den Gode Webservice - Security Analysis Cryptomathic A/S September, 2006 Executive Summary This report analyses the security mechanisms provided in Den Gode Web Service (DGWS). DGWS provides a framework
A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems
Volume 1, Number 2, December 2014 JOURNAL OF COMPUTER SCIENCE AND SOFTWARE APPLICATION A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems Satish Kumar*,
Protocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
Business Object Document (BOD) Message Architecture for OAGIS Release 9.+
Business Object Document (BOD) Message Architecture for OAGIS Release 9.+ an OAGi White Paper Document #20110408V1.0 Open standards that open markets TM Open Applications Group, Incorporated OAGi A consortium
Prescription Monitoring Program Information Exchange Service. Execution Context Version 1.0
Prescription Monitoring Program Information Exchange Service Execution Context Version 1.0 April 2012 Reference TABLE OF CONTENTS 1 Introduction... 5 1.1 Overview... 5 1.2 Purpose... 6 2 System Overview...
Detailed Specifications
1 of 6 Appendix Detailed Specifications 1. Standards The following standards are used in the document under the following abbreviations: - BASE32, BASE64, BASE64-URL: Network Working Group: Request for
New York State Federal/State Employment Tax (FSET) Handbook for Software Developers
Publication 120 (08/13) New York State Federal/State Employment Tax (FSET) Handbook for Software Developers The information presented is current as of this publication's print date. Visit our Web site
Norwegian e-health Infrastructure based on XML, ebxml and PKI
An OASIS Case Study Norwegian e-health Infrastructure based on XML, ebxml and PKI Trygdeetaten Case Study By Pim van der Eijk For OASIS OASIS (Organization for the Advancement of Structured Information
Open Geospatial Consortium, Inc.
Open Geospatial Consortium, Inc. Date: 2010-08-18 Reference number of this document: OGC 10-130 Category: OGC Public Engineering Report Editor: Debbie Wilson OGC OWS-7 Aviation FUSE Deployment Engineering
ATWD XML Web Service Handbook
ATWD XML Web Service Version 2.0 This handbook provides technical information to those organisations wishing to utilise the HMRC ATWD XML Web Service. Version 2.0 Issued Page 1 of 41 July 2010 Template
GetLibraryUserOrderList
GetLibraryUserOrderList Webservice name: GetLibraryUserOrderList Adress: https://www.elib.se/webservices/getlibraryuserorderlist.asmx WSDL: https://www.elib.se/webservices/getlibraryuserorderlist.asmx?wsdl
Encryption, Signing and Compression in Financial Web Services
Danske Bank Encryption, Signing and Compression in Financial Web Services Details of how to call the Danske Bank financial web service Version 2.4.7 Encryption, Signing and Compression in Financial Web
X12 837 Real-Time Claim Submission & Connectivity Specifications. Highmark, Inc. October 1, 2014 Document Version 1.1
X12 837 Real-Time Claim Submission & Connectivity Specifications Highmark, Inc. October 1, 2014 Document Version 1.1 Contents 1. Real-Time Overview 2. Requirements 3. SOAP Messages 4. SOAP Faults 5. Highmark
Network Security. Chapter 10. Application Layer Security: Web Services. Part I: Introduction to Web Services
Network Architectures and Services, Georg Carle Faculty of Informatics Technische Universität München, Germany Part I: Introduction to Web Services Network Security Chapter 10 Application Layer Security:
IP Addressing. IP Addresses. Introductory material.
IP Addressing Introductory material. An entire module devoted to IP addresses. IP Addresses Structure of an IP address Classful IP addresses Limitations and problems with classful IP addresses Subnetting
Technik und Informatik. SOAP Security. Prof. Dr. Eric Dubuis Berner Fachhochschule Biel. Version April 11, 2012
SOAP Security Prof. Dr. Eric Dubuis Berner Fachhochschule Biel Version April 11, 2012 Overview Motivation Transport security versus SOAP Security WS-Security stack overview Structure of secured SOAP messages
Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
Web Services Security: What s Required To Secure A Service-Oriented Architecture. An Oracle White Paper January 2008
Web Services Security: What s Required To Secure A Service-Oriented Architecture An Oracle White Paper January 2008 Web Services Security: What s Required To Secure A Service-Oriented Architecture. INTRODUCTION
SOAP WSDL & HTTP MIME REST Web Services Companion Guide HIPAA Operating Rules (HOpR) CORE Phase II
SOAP WSDL & HTTP MIME REST Web Services Companion Guide HIPAA Operating Rules (HOpR) CORE Phase II Companion Guide for web service options supporting the connectivity for and retrieval of ERA (835) transactions.
