Results 111 to 120 of about 877 (167)
Some of the next articles are maybe not open access.
XBMRSA: A new XML encryption algorithm
2012 World Congress on Information and Communication Technologies, 2012Extensible Markup Language (XML) is used to exchange messages across different networks due to its flexibility and adaptability. Due to the wide usage of XML documents over internet there arises a need to protect these documents to provide data confidentiality and privacy.
N. Nithin, Anupkumar M Bongale
openaire +1 more source
Proceedings of the 2002 ACM workshop on XML security - XMLSEC '02, 2002
This paper describes an alternative encryption method for XML [1] which is capable to encrypt single XML Information Set [2] items. It is able to hide the size and the existence of encrypted contents. As a result, it prevents a 'traffic analysis', i.e. it's analogous counterpart for documents.
openaire +1 more source
This paper describes an alternative encryption method for XML [1] which is capable to encrypt single XML Information Set [2] items. It is able to hide the size and the existence of encrypted contents. As a result, it prevents a 'traffic analysis', i.e. it's analogous counterpart for documents.
openaire +1 more source
2002
In this chapter, I’ll talk about the Extensible Markup Language (XML) Encryption and Signatures specifications. These specifications are important for cryptography developers, as XML is now used in business data exchange and system interoperability protocols.
Jason Bock +3 more
openaire +1 more source
In this chapter, I’ll talk about the Extensible Markup Language (XML) Encryption and Signatures specifications. These specifications are important for cryptography developers, as XML is now used in business data exchange and system interoperability protocols.
Jason Bock +3 more
openaire +1 more source
XFlat: Query Friendly Encrypted XML View Publishing
Information Sciences, 2006The security of the published XML data receives high attention due to the sensitive nature of the data in some areas. This paper proposes an XML view publishing method called XFlat. Compared with other methods, XFlat focuses on the efficiency of query evaluation over the published XML view.
Jun Gao, Tengjiao Wang, Dongqing Yang
openaire +1 more source
Computation and Search over Encrypted XML Documents
2015 IEEE International Congress on Big Data, 2015The need for privacy-protected searching has garnered increasing interest as industries continue to adopt cloud technologies. Much of the recent efforts have been towards incorporating more advanced searching techniques. Although many have proposed solutions for search and computations in unencrypted data, developing efficient solutions over encrypted ...
Hoi Ting Poon, Ali Miri
openaire +1 more source
Efficient XQuery over encrypted XML documents
2015 10th International Conference on Computer Science & Education (ICCSE), 2015Data plays an important role in today's business activities. In order to share information, data is outsourced occasionally, usually in the form of Extensible Markup Language (XML) files which may contain sensitive information only intended for specific audiences. Securing the data is, as a result, of the utmost importance.
Azhar Rauf +4 more
openaire +1 more source
Exploring queriability of encrypted and compressed XML data
2009 24th International Symposium on Computer and Information Sciences, 2009When large XML documents are shared, documents compression and encryption become simultaneously important for efficient and secure access. Existing approaches for compressing and encrypting large XML documents provide a non-queriable intermediate document representation, creating a need to decompress and decrypt the whole document before any access ...
Islam Elgedawy +2 more
openaire +1 more source
XML-based model for data communication encryption
2011 3rd International Conference on Computer Research and Development, 2011It is not easy to solve the problem, which is solving business chain in the communication process sensitive data in XML security issues for XML signature, on the security of XML based on the study. This paper proposes XML-based data communications encryption technology model that enables the sender to encrypt and the overall signature, XML-based ...
null Wang Hao-yu +2 more
openaire +1 more source
A Retrieve Model of WESU for Encrypted XML Database
2010 2nd International Workshop on Database Technology and Applications, 2010To resolve the problems of poor security and low retrieve efficiency for XML DAS, a new retrieve model of WESU foe encrypted XML database is presented in this paper. It establishes the value index and structure index in the encrypted XML database, and executes the barrel management algorithm to record the entrance addresses in the value index and ...
Nan Shao, Xuanmin Lu, Heng Wu
openaire +1 more source
The Key Management of the Encrypted Database Based on XML
Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007Encryption is an effective way to enhance the security of the database. The key management is the important factor to ensure the security of the encrypted database. But the current scheme of the key management has some security problem and is easily attacked.
Yong Zhang, Qin-tao Song, Xia-mu Niu
openaire +1 more source

