Results 121 to 130 of about 877 (167)
Some of the next articles are maybe not open access.

XML Signatures and Encryption

2016
Many XML uses today need security, particularly in terms of authentication and confidentiality. Consider commercial transactions. It should be clear why purchase orders, payments, delivery receipts, contracts, and the like need authentication. In many cases, particularly when the transaction involves multiple parties, different parts of a message need ...
openaire   +1 more source

A novel model for query over encrypted XML databases

2009 IEEE International Conference on Network Infrastructure and Digital Content, 2009
In recent years, there has been increasing concern about “Database as a Service”(DAS) architectures. Data security is the overriding concern in DAS, and encryption is a natural solution. However, queries over encrypted databases are usually inefficient due to a heap of time on the encryption and decryption.
null Nian Liu   +3 more
openaire   +1 more source

Developing an efficient query system for encrypted XML documents

Journal of Systems and Software, 2011
XQuery is a query and functional programming language that is designed for querying the data in XML documents. This paper addresses how to efficiently query encrypted XML documents using XQuery, with the key point being how to eliminate redundant decryption so as to accelerate the querying process.
Tao-Ku Chang, Gwan-Hwan Hwang
openaire   +1 more source

Efficient tree pattern queries on encrypted XML documents

Proceedings of the Joint EDBT/ICDT 2013 Workshops, 2013
Outsourcing XML documents is a challenging task, because it encrypts the documents, while still requiring efficient query processing. Past approaches on this topic either leak structural information or fail to support searching that has constraints on XML node content. In addition, they adopt a filtering-and-refining framework, which requires the users
Cao, Jianneng   +4 more
openaire   +2 more sources

On Encrypting and Signing Binary XML Messages in the Wireless Environment

2006 IEEE International Conference on Web Services (ICWS'06), 2006
In the wireless world there has recently been much interest in alternate serialization formats for XML data, mostly driven by the weak capabilities of both devices and networks. However, an alternate serialization format is not easily made compatible with XML security features such as encryption and signing.
Jaakko Kangasharju   +2 more
openaire   +1 more source

Research and application on the query processing for encrypted XML data

2010 IEEE International Conference on Advanced Management Science(ICAMS 2010), 2010
Based on the analysis of the existing Query-Aware Decryption Algorithm, an improved query processing algorithm for encrypted XML data is developed, which allows us to decrypt only those parts that would contribute to the query result. Our algorithm applies Hash tables and chained lists to create the indexes for user keys, and disseminates an encrypted ...
null Li Juan, null Ming De-ting
openaire   +1 more source

A survey on querying encrypted XML documents for databases as a service

ACM SIGMOD Record, 2008
"Database as a service" paradigm has gained a lot of interest in recent years. This has raised questions about the security of data in the servers. Firms outsourcing their XML databases to untrusted parties started to look for new ways to securely store data and efficiently query them.
Ozan Ünay, Taflan I. Gündem
openaire   +1 more source

Encrypted XML Data Query Processing with Range Query

Applied Mechanics and Materials, 2011
Without decrypting the encrypted blocks, it is difficult to query encrypted XML data. Inspired by Query-Aware decryption scheme, the paper extends the scheme to support range query with value index. Value index is based on order preserving encryption.
Bao Long Liu, Hua Chen, Yi Guo
openaire   +1 more source

The research of asymmetrical encryption algorithm XRSA based on XML

2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), 2011
This paper studies principles and procedure of one kind of asymmetrical encryption algorithm XRSA based on XML. First, according to the works of asymmetrical encryption algorithm, given works of RSA algorithms and processing procedure of XML encrypter, and then analyzes the time complexity of RSA algorithm.
null Fang Xiang, null Hongfu Wang
openaire   +1 more source

Securing confidential data in XML using custom level encryption

2016 International Conference on Computation of Power, Energy Information and Commuincation (ICCPEIC), 2016
Web application, web services and mobile computing are extensively using sensitive data. In some scenario, confidential data will be stored into the XML node. Encryption is the solution to keep confidential data in the XML file. Encryption and decryption uses same the key in symmetric algorithm.
V. Sankar, G. Zayaraz
openaire   +1 more source

Home - About - Disclaimer - Privacy