Results 101 to 110 of about 877 (167)
Common data models and data standards for tabular health data: a systematic review. [PDF]
Finster M, Wenzel M, Taghizadeh E.
europepmc +1 more source
Overview of a national endoscopy database: The Trans.IT database and its impact on data registration quality. [PDF]
Theunissen F +5 more
europepmc +1 more source
Applicability Assessment of Technologies for Predictive and Prescriptive Analytics of Nephrology Big Data. [PDF]
Stojanov R +12 more
europepmc +1 more source
A comprehensive presentation to XML signature and encryption
XML has been widely adopted for information exchange across various networks due to flexibility providing common syntax for messaging systems. XML documents may contain private information that cannot be shared by all user communities. Therefore, XML Security has a great importance to the overall security of the distributed systems.
A. A. Abd El-Aziz, A. Kannan
openaire +2 more sources
A file-based implementation of XML encryption
XML is the de-facto language of business transaction and widely used as a standard format to exchange electronic documents and messages. The most popular technology about the XML is the feature of structuring data and the XML based encryption in a natural way to handle complex requirement for securing XML data flow and exchange between applications. In
Sea Chong Seak, Ng Kang Siong
openaire +2 more sources
A stream-based implementation of XML encryption
W3C has been working on the standardization of XML Encryption and released its specification as a W3C Proposed Recommendation in 2002. There are several implementations of the specification, all of which are implemented using DOM. However, it is commonly accepted that DOM has higher costs in time and space than other APIs.
Takeshi Imamura +2 more
+4 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Symmetric encryption and XML encryption patterns
Proceedings of the 16th Conference on Pattern Languages of Programs, 2009Most of the time information handled by organizations has been collected and processed by computers and transmitted across networks to other computers. How can we protect this information from unauthorized access when it is being transmitted? Encryption provides confidentiality by protecting sensitive information from being read by intruders.
Keiko Hashizume, Eduardo B. Fernandez
openaire +1 more source
Querying Encrypted XML Documents
2006 10th International Database Engineering and Applications Symposium (IDEAS'06), 2006This paper proposes techniques to query encrypted XML documents. Such a problem predominantly occurs in ?Database as a Service? (DAS) architectures, where a client may outsource data to a service provider that provides data management services. Security is of paramount concern, as the service provider itself may be untrusted.
Ravi Chandra Jammalamadaka +1 more
openaire +1 more source
Proceedings of the 18th ACM conference on Computer and communications security, 2011
XML Encryption was standardized by W3C in 2002, and is implemented in XML frameworks of major commercial and open-source organizations like Apache, redhat, IBM, and Microsoft. It is employed in a large number of major web-based applications, ranging from business communications, e-commerce, and financial services over healthcare applications to ...
Jager, T., Somorovsky, J.
openaire +2 more sources
XML Encryption was standardized by W3C in 2002, and is implemented in XML frameworks of major commercial and open-source organizations like Apache, redhat, IBM, and Microsoft. It is employed in a large number of major web-based applications, ranging from business communications, e-commerce, and financial services over healthcare applications to ...
Jager, T., Somorovsky, J.
openaire +2 more sources
A New Hybrid Approach for Encrypting XML Documents
2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 2021This paper proposes an approach for encrypting XML documents by using the elliptic curve cryptography (ECC) and chaos to overcome the problem of allocating secret keys and to make fast encryption mechanism respectively. The purposes of applying the ECC are to generate and allocate secret keys and the digital signature.
Anil Kumar +3 more
openaire +1 more source

