Results 111 to 120 of about 877 (167)
Some of the next articles are maybe not open access.

XBMRSA: A new XML encryption algorithm

2012 World Congress on Information and Communication Technologies, 2012
Extensible Markup Language (XML) is used to exchange messages across different networks due to its flexibility and adaptability. Due to the wide usage of XML documents over internet there arises a need to protect these documents to provide data confidentiality and privacy.
N. Nithin, Anupkumar M Bongale
openaire   +1 more source

XML pool encryption

Proceedings of the 2002 ACM workshop on XML security - XMLSEC '02, 2002
This paper describes an alternative encryption method for XML [1] which is capable to encrypt single XML Information Set [2] items. It is able to hide the size and the existence of encrypted contents. As a result, it prevents a 'traffic analysis', i.e. it's analogous counterpart for documents.
openaire   +1 more source

XML Encryption and Signatures

2002
In this chapter, I’ll talk about the Extensible Markup Language (XML) Encryption and Signatures specifications. These specifications are important for cryptography developers, as XML is now used in business data exchange and system interoperability protocols.
Jason Bock   +3 more
openaire   +1 more source

XFlat: Query Friendly Encrypted XML View Publishing

Information Sciences, 2006
The security of the published XML data receives high attention due to the sensitive nature of the data in some areas. This paper proposes an XML view publishing method called XFlat. Compared with other methods, XFlat focuses on the efficiency of query evaluation over the published XML view.
Jun Gao, Tengjiao Wang, Dongqing Yang
openaire   +1 more source

Computation and Search over Encrypted XML Documents

2015 IEEE International Congress on Big Data, 2015
The need for privacy-protected searching has garnered increasing interest as industries continue to adopt cloud technologies. Much of the recent efforts have been towards incorporating more advanced searching techniques. Although many have proposed solutions for search and computations in unencrypted data, developing efficient solutions over encrypted ...
Hoi Ting Poon, Ali Miri
openaire   +1 more source

Efficient XQuery over encrypted XML documents

2015 10th International Conference on Computer Science & Education (ICCSE), 2015
Data plays an important role in today's business activities. In order to share information, data is outsourced occasionally, usually in the form of Extensible Markup Language (XML) files which may contain sensitive information only intended for specific audiences. Securing the data is, as a result, of the utmost importance.
Azhar Rauf   +4 more
openaire   +1 more source

Exploring queriability of encrypted and compressed XML data

2009 24th International Symposium on Computer and Information Sciences, 2009
When large XML documents are shared, documents compression and encryption become simultaneously important for efficient and secure access. Existing approaches for compressing and encrypting large XML documents provide a non-queriable intermediate document representation, creating a need to decompress and decrypt the whole document before any access ...
Islam Elgedawy   +2 more
openaire   +1 more source

XML-based model for data communication encryption

2011 3rd International Conference on Computer Research and Development, 2011
It is not easy to solve the problem, which is solving business chain in the communication process sensitive data in XML security issues for XML signature, on the security of XML based on the study. This paper proposes XML-based data communications encryption technology model that enables the sender to encrypt and the overall signature, XML-based ...
null Wang Hao-yu   +2 more
openaire   +1 more source

A Retrieve Model of WESU for Encrypted XML Database

2010 2nd International Workshop on Database Technology and Applications, 2010
To resolve the problems of poor security and low retrieve efficiency for XML DAS, a new retrieve model of WESU foe encrypted XML database is presented in this paper. It establishes the value index and structure index in the encrypted XML database, and executes the barrel management algorithm to record the entrance addresses in the value index and ...
Nan Shao, Xuanmin Lu, Heng Wu
openaire   +1 more source

The Key Management of the Encrypted Database Based on XML

Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Encryption is an effective way to enhance the security of the database. The key management is the important factor to ensure the security of the encrypted database. But the current scheme of the key management has some security problem and is easily attacked.
Yong Zhang, Qin-tao Song, Xia-mu Niu
openaire   +1 more source

Home - About - Disclaimer - Privacy