[ch07biblio_001] [Anne1] Anne Anderson. “A Comparison of EPAL and XACML.” Sun Microsystems. July 12, 2004. http://research.sun.com/projects/xacml/CompareEPALandXACML.html

[ch07biblio_002] [Anne2] Anne Anderson. “IEEE Policy 2004 Workshop 8 June 2004–Comparing WSPL and WS-Policy.” IEEE Policy 2004. http://www.policy-workshop.org/2004/slides/Anderson-WSPL_vs_WS-Policy_v2.pdf

[ch07biblio_003] [Anne3] Anne Anderson. “An Introduction to the Web Services Policy Language (WSPL).” Sun Microsystems Laboratories. 2004. http://research.sun.com/projects/xacml/Policy2004.pdf

[ch07biblio_004] [KingPerkins1] Chris King and Earl Perkins. “The Role of Identity Management in Information Security: Part I–The Planning View.” http://techupdate.zdnet.com/techupdate/stories/main/Identity_Management_Information_Security_Part_1.html ...

Get Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.