Results 101 to 110 of about 877 (167)

Overview of a national endoscopy database: The Trans.IT database and its impact on data registration quality. [PDF]

open access: yesUnited European Gastroenterol J
Theunissen F   +5 more
europepmc   +1 more source

Applicability Assessment of Technologies for Predictive and Prescriptive Analytics of Nephrology Big Data. [PDF]

open access: yesProteomics
Stojanov R   +12 more
europepmc   +1 more source

A comprehensive presentation to XML signature and encryption

open access: closed2013 International Conference on Recent Trends in Information Technology (ICRTIT), 2013
XML has been widely adopted for information exchange across various networks due to flexibility providing common syntax for messaging systems. XML documents may contain private information that cannot be shared by all user communities. Therefore, XML Security has a great importance to the overall security of the distributed systems.
A. A. Abd El-Aziz, A. Kannan
openaire   +2 more sources

A file-based implementation of XML encryption

open access: closed2011 Malaysian Conference in Software Engineering, 2011
XML is the de-facto language of business transaction and widely used as a standard format to exchange electronic documents and messages. The most popular technology about the XML is the feature of structuring data and the XML based encryption in a natural way to handle complex requirement for securing XML data flow and exchange between applications. In
Sea Chong Seak, Ng Kang Siong
openaire   +2 more sources

A stream-based implementation of XML encryption

open access: closedProceedings of the 2002 ACM workshop on XML security -, 2002
W3C has been working on the standardization of XML Encryption and released its specification as a W3C Proposed Recommendation in 2002. There are several implementations of the specification, all of which are implemented using DOM. However, it is commonly accepted that DOM has higher costs in time and space than other APIs.
Takeshi Imamura   +2 more
  +4 more sources

Symmetric encryption and XML encryption patterns

Proceedings of the 16th Conference on Pattern Languages of Programs, 2009
Most of the time information handled by organizations has been collected and processed by computers and transmitted across networks to other computers. How can we protect this information from unauthorized access when it is being transmitted? Encryption provides confidentiality by protecting sensitive information from being read by intruders.
Keiko Hashizume, Eduardo B. Fernandez
openaire   +1 more source

Querying Encrypted XML Documents

2006 10th International Database Engineering and Applications Symposium (IDEAS'06), 2006
This paper proposes techniques to query encrypted XML documents. Such a problem predominantly occurs in ?Database as a Service? (DAS) architectures, where a client may outsource data to a service provider that provides data management services. Security is of paramount concern, as the service provider itself may be untrusted.
Ravi Chandra Jammalamadaka   +1 more
openaire   +1 more source

How to break XML encryption

Proceedings of the 18th ACM conference on Computer and communications security, 2011
XML Encryption was standardized by W3C in 2002, and is implemented in XML frameworks of major commercial and open-source organizations like Apache, redhat, IBM, and Microsoft. It is employed in a large number of major web-based applications, ranging from business communications, e-commerce, and financial services over healthcare applications to ...
Jager, T., Somorovsky, J.
openaire   +2 more sources

A New Hybrid Approach for Encrypting XML Documents

2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 2021
This paper proposes an approach for encrypting XML documents by using the elliptic curve cryptography (ECC) and chaos to overcome the problem of allocating secret keys and to make fast encryption mechanism respectively. The purposes of applying the ECC are to generate and allocate secret keys and the digital signature.
Anil Kumar   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy