[ch07biblio_001] [Anne1] “A Comparison of EPAL and XACML.” Sun Microsystems. July 12, 2004. http://research.sun.com/projects/xacml/CompareEPALandXACML.html
[ch07biblio_002] [Anne2] “IEEE Policy 2004 Workshop 8 June 2004–Comparing WSPL and WS-Policy.” IEEE Policy 2004. http://www.policy-workshop.org/2004/slides/Anderson-WSPL_vs_WS-Policy_v2.pdf
[ch07biblio_003] [Anne3] “An Introduction to the Web Services Policy Language (WSPL).” Sun Microsystems Laboratories. 2004. http://research.sun.com/projects/xacml/Policy2004.pdf
[ch07biblio_004] [KingPerkins1] and “The Role of Identity Management in Information Security: Part I–The Planning View.” http://techupdate.zdnet.com/techupdate/stories/main/Identity_Management_Information_Security_Part_1.html ...
Get Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.