Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Validation Techniques: Layered, Data, and Protocol Validation, Slides of Information Security and Markup Languages

Various validation techniques to ensure data accuracy and interoperability in different layers of communication. It covers layered validation at the network, transport, encoding, format, and conversation layers, data validation using xml schema and heuristics, and protocol validation through interoperability testing and boundary condition analysis.

Typology: Slides

2012/2013

Uploaded on 04/22/2013

satheesh
satheesh 🇮🇳

4.5

(11)

91 documents

1 / 4

Toggle sidebar

Related documents


Partial preview of the text

Download Validation Techniques: Layered, Data, and Protocol Validation and more Slides Information Security and Markup Languages in PDF only on Docsity! Thoughts on Validation Docsity.com Layered Validation • Validation must take place at every layer where errors may occur: – Underlying network layer: TCPIP – Application transport: HTTP – Encoding of data: SOAP – Format of data: XML Schema – Conversations: ?? Docsity.com
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved