Advanced security and network forensics: web Infrastructures.

5 WEB INFRASTRUCTURES 5.1 Objectives 5.2 Introduction 5.3 Identity 2.0 5.4 SOAP over HTTP 5.5 LDAP X.500 5.6 Authentication Infrastructures 5.7 802.1x Authentication Infrastructure Authentication techniques Security weaknesses of RADIUS 5.8 OpenID 5.9 Kerberos Microsoft CardSpace 5.10 WS-* 5.6.1 SAML 5.11 Access Control 5.10.1 XACML 5.12 Tutorial