Part II. Building blocks of SOA security
Part II introduces the techniques you can use for addressing the following fundamental concerns of SOA security:
- Claiming and verifying identity (authentication)
- Protecting confidentiality of messages (chapter 6)
- Verifying message integrity and guarding against repudiation (chapter 7)
The techniques we will describe in this part form the basis for most of the discussion in part III, where we discuss enterprise SOA security. In this sense, we can think of the techniques described in part II as the fundamental building blocks of SOA security. ...