Hello,
We are interested in analysis of WS-Security
protocols.
We have problems in finding examples of
implementations of the WS-Security specification.
We would be grateful if anyone can send us so
examples of such implementations.
Thanks
Eldar Kleiner
Oxford University
|