Results 131 to 140 of about 18,387 (191)

Scalable cyberinfrastructure for experimental NMR data. [PDF]

open access: yesSci Data
Hoch JC   +26 more
europepmc   +1 more source

XML pool encryption

open access: closedProceedings of the 2002 ACM workshop on XML security - XMLSEC '02, 2002
This paper describes an alternative encryption method for XML [1] which is capable to encrypt single XML Information Set [2] items. It is able to hide the size and the existence of encrypted contents. As a result, it prevents a 'traffic analysis', i.e. it's analogous counterpart for documents.
Christian Geuer-Pollmann
openaire   +2 more sources

Symmetric encryption and XML encryption patterns

open access: closedProceedings of the 16th Conference on Pattern Languages of Programs, 2009
Most of the time information handled by organizations has been collected and processed by computers and transmitted across networks to other computers. How can we protect this information from unauthorized access when it is being transmitted? Encryption provides confidentiality by protecting sensitive information from being read by intruders.
Keiko Hashizume, Eduardo B. Fernandez
openaire   +2 more sources

XML-based model for data communication encryption

open access: closed2011 3rd International Conference on Computer Research and Development, 2011
It is not easy to solve the problem, which is solving business chain in the communication process sensitive data in XML security issues for XML signature, on the security of XML based on the study. This paper proposes XML-based data communications encryption technology model that enables the sender to encrypt and the overall signature, XML-based ...
null Wang Hao-yu   +2 more
openaire   +2 more sources

How to break XML encryption

open access: closedProceedings of the 18th ACM conference on Computer and communications security, 2011
XML Encryption was standardized by W3C in 2002, and is implemented in XML frameworks of major commercial and open-source organizations like Apache, redhat, IBM, and Microsoft. It is employed in a large number of major web-based applications, ranging from business communications, e-commerce, and financial services over healthcare applications to ...
Jager, T., Somorovsky, J.
openaire   +3 more sources

A file-based implementation of XML encryption

open access: closed2011 Malaysian Conference in Software Engineering, 2011
XML is the de-facto language of business transaction and widely used as a standard format to exchange electronic documents and messages. The most popular technology about the XML is the feature of structuring data and the XML based encryption in a natural way to handle complex requirement for securing XML data flow and exchange between applications. In
Sea Chong Seak, Ng Kang Siong
openaire   +2 more sources

A comprehensive presentation to XML signature and encryption

open access: closed2013 International Conference on Recent Trends in Information Technology (ICRTIT), 2013
XML has been widely adopted for information exchange across various networks due to flexibility providing common syntax for messaging systems. XML documents may contain private information that cannot be shared by all user communities. Therefore, XML Security has a great importance to the overall security of the distributed systems.
A. A. Abd El-Aziz, A. Kannan
openaire   +2 more sources

Securing confidential data in XML using custom level encryption

open access: closed2016 International Conference on Computation of Power, Energy Information and Commuincation (ICCPEIC), 2016
Web application, web services and mobile computing are extensively using sensitive data. In some scenario, confidential data will be stored into the XML node. Encryption is the solution to keep confidential data in the XML file. Encryption and decryption uses same the key in symmetric algorithm.
V. Sankar, G. Zayaraz
openaire   +2 more sources

Home - About - Disclaimer - Privacy