XML security News
September 24, 2008
Verizon Wireless employed Oracle BPEL Manager with a rules engine to study call patterns. That led to a reduction in lines of Java code for an app that provides fraud detection teams with better information for decision making. It also used less ...
February 06, 2008
This week Oracle Corp. released its Oracle Data Integration Suite, which the company says provides a heterogeneous data services strategy for service-oriented architecture (SOA) implementations. The Oracle technology will create data services from ...
April 04, 2007
It was always possible to make SOAP messages secure, says the Burton Group's Anne Thomas Manes, but the new WS-I Basic Security Profile now makes it easier for Web services developers to ensure interoperability.
February 23, 2007
Cisco's purchase of Reactivity this week reflects the processing and security demands SOA is putting on the traditional network, which is fueling demand for XML appliances, vendors say.
XML security Get Started
Bring yourself up to speed with our introductory content
A Web bug, also known as a Web beacon, is a file object (usually a graphic image such as a transparent GIF) that is placed on a Web page or in an e-mail message to monitor user behavior. Continue Reading
Securing XML is an essential element in keeping Web services secure. This SearchSOA.com Learning Guide is a compilation of resources that review different types of XML security standards and approaches for keeping your XML Web services secure. Continue Reading
Securing XML is an essential element in keeping Web services secure. This tutorial is a compilation of resources that review different types of XML security standards and approaches for keeping your XML Web services secure. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate XML security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
This chapter looks at the pluses and minues of implementing and consuming Web services in a .NET environment. Continue Reading
Attendees at the XML 2006 conference in Boston got a sneak peek into Denmark's proposed e-commerce network, which will leverage a slew of Web services standards, XML documents and service-oriented principles. Continue Reading
On the Internet everybody shares the same security problems. This XML tip discusses how the W3C and OASIS are working to change that. Continue Reading
Manage XML security
Learn to apply best practices and optimize your operations.
This chapter discusses security-related concerns that have particular implications for Ajax. Continue Reading
Coming out of the work on Binary XML, Efficient XML Interchange compresses the notoriously verbose data format on top of adding processing efficiency. Continue Reading
Ed Tittel discusses xml2ddl, a data integration and management tool for those using one of the supported target databases. Continue Reading
Problem Solve XML security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
While the XQuery 1.0 specification may have taken years to get finalized, major database engines already support it. XML guru Ed Tittel notes that there's a massive reservoir of available information on XQuery as well, making it a standard that's ... Continue Reading
In this tip, Ed Tittel discusses the tools and benefits of XMLSpy 2006. Continue Reading
In this tip, Ed Tittel discusses XML security development with two different security toolkits. Continue Reading