Results 141 to 150 of about 18,387 (191)
Applying XML Signature and XML Encryption to Peer-to-Peer Platform Security
Hiromitsu Sumino +4 more
openaire +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Querying Encrypted XML Documents
2006 10th International Database Engineering and Applications Symposium (IDEAS'06), 2006This paper proposes techniques to query encrypted XML documents. Such a problem predominantly occurs in ?Database as a Service? (DAS) architectures, where a client may outsource data to a service provider that provides data management services. Security is of paramount concern, as the service provider itself may be untrusted.
Ravi Chandra Jammalamadaka +1 more
openaire +1 more source
XFlat: Query Friendly Encrypted XML View Publishing
Information Sciences, 2006The security of the published XML data receives high attention due to the sensitive nature of the data in some areas. This paper proposes an XML view publishing method called XFlat. Compared with other methods, XFlat focuses on the efficiency of query evaluation over the published XML view.
Jun Gao, Tengjiao Wang, Dongqing Yang
openaire +1 more source
XBMRSA: A new XML encryption algorithm
2012 World Congress on Information and Communication Technologies, 2012Extensible Markup Language (XML) is used to exchange messages across different networks due to its flexibility and adaptability. Due to the wide usage of XML documents over internet there arises a need to protect these documents to provide data confidentiality and privacy.
N. Nithin, Anupkumar M Bongale
openaire +1 more source
Efficient XQuery over encrypted XML documents
2015 10th International Conference on Computer Science & Education (ICCSE), 2015Data plays an important role in today's business activities. In order to share information, data is outsourced occasionally, usually in the form of Extensible Markup Language (XML) files which may contain sensitive information only intended for specific audiences. Securing the data is, as a result, of the utmost importance.
Azhar Rauf +4 more
openaire +1 more source
2002
In this chapter, I’ll talk about the Extensible Markup Language (XML) Encryption and Signatures specifications. These specifications are important for cryptography developers, as XML is now used in business data exchange and system interoperability protocols.
Jason Bock +3 more
openaire +1 more source
In this chapter, I’ll talk about the Extensible Markup Language (XML) Encryption and Signatures specifications. These specifications are important for cryptography developers, as XML is now used in business data exchange and system interoperability protocols.
Jason Bock +3 more
openaire +1 more source
A stream-based implementation of XML encryption
Proceedings of the 2002 ACM workshop on XML security -, 2002W3C has been working on the standardization of XML Encryption and released its specification as a W3C Proposed Recommendation in 2002. There are several implementations of the specification, all of which are implemented using DOM. However, it is commonly accepted that DOM has higher costs in time and space than other APIs.
Takeshi Imamura +2 more
openaire +1 more source
A New Hybrid Approach for Encrypting XML Documents
2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 2021This paper proposes an approach for encrypting XML documents by using the elliptic curve cryptography (ECC) and chaos to overcome the problem of allocating secret keys and to make fast encryption mechanism respectively. The purposes of applying the ECC are to generate and allocate secret keys and the digital signature.
Anil Kumar +3 more
openaire +1 more source
Computation and Search over Encrypted XML Documents
2015 IEEE International Congress on Big Data, 2015The need for privacy-protected searching has garnered increasing interest as industries continue to adopt cloud technologies. Much of the recent efforts have been towards incorporating more advanced searching techniques. Although many have proposed solutions for search and computations in unencrypted data, developing efficient solutions over encrypted ...
Hoi Ting Poon, Ali Miri
openaire +1 more source
Efficient tree pattern queries on encrypted XML documents
Proceedings of the Joint EDBT/ICDT 2013 Workshops, 2013Outsourcing XML documents is a challenging task, because it encrypts the documents, while still requiring efficient query processing. Past approaches on this topic either leak structural information or fail to support searching that has constraints on XML node content. In addition, they adopt a filtering-and-refining framework, which requires the users
Cao, Jianneng +4 more
openaire +2 more sources

