Results 1 to 10 of about 638,581 (229)

Spatial Signature Method (SSM) Against XML Signature Wrapping Attacks [PDF]

open access: diamondMATEC Web of Conferences, 2019
Living in cyber world with revolutionizes of Industrial 4.0, most of the users and organisations prefer to sell and buy products or services via website online transaction.
Saudi Madihah Mohd   +3 more
doaj   +4 more sources

New XML Signature Scheme That is Resistant to Some Attacks [PDF]

open access: goldIEEE Access, 2020
Supporting the execution of transactions through the use of electronic documents requires security. The scope of this security primarily involves ensuring the integrity, authenticity and non-repudiation of the origin of information.
Gerard Wawrzyniak, Imed El Fray
doaj   +3 more sources

XML Encryption and Signature for Securing Web Services

open access: diamondInternational Journal of Computer Science and Information Technology, 2020
In this research, we have focused on the most challenging issue that Web Services face, i.e. how to secure their information. Web Services security could be guaranteed by employing security standards, which is the main focus of this search. Every suggested model related to security design should put in the account the securities' objectives; integrity,
Iehab Alrassan
semanticscholar   +5 more sources

XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany [PDF]

open access: greenIFIP International Information Security Conference, 2021
XML Signature Wrapping (XSW) has been a relevant threat to web services for 15 years until today. Using the Personal Health Record (PHR), which is currently under development in Germany, we investigate a current SOAP-based web services system as a case ...
Paul Höller   +2 more
semanticscholar   +5 more sources

On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks [PDF]

open access: yes2011 1st International Workshop on Securing Services on the Cloud (IWSSC), 2011
In the context of security of Web Services, the XML Signature Wrapping attack technique has lately received increasing attention. Following a broad range of real-world exploits, general interest in applicable countermeasures rises. However, few approaches for countering these attacks have been investigated closely enough to make any claims about their ...
Meiko Jensen   +3 more
semanticscholar   +3 more sources

Securing Web Services Using XML Signature and XML Encryption [PDF]

open access: green, 2013
6 pages, 8 figures, 1 ...
Saravanaguru, RA. K.   +3 more
openaire   +3 more sources

VOEvent authentication via XML digital signature [PDF]

open access: bronzeAstronomische Nachrichten, 2008
AbstractA trivial modification to the XML schema of VOEvent v1.1 allows the inclusion of W3C digital signatures. Signatures enable identification, identification enables trust, and trust enables authorization. Such changes would inhibit abuse of the VOEvent networks. (© 2008 WILEY‐VCH Verlag GmbH & Co. KGaA, Weinheim)
Summer L. Allen
openaire   +2 more sources

Web Services Security Based on XML Signature and XML Encryption

open access: yesJournal of Networks, 2010
With the development of web services application, some issues of web services security are increasingly prominent. As a platform-independent language, XML is widely used for its high expansibility. After analysis the traditional web services security technology, this paper formulates the XML signature and encryption as the core of web services security
Yue-sheng Gu, Meng-tao Ye, Yong Gan
semanticscholar   +2 more sources

Desain Sistem Keamanan Distribusi Data Dengan Menerapkan XML Encryption Dan XML Signature Berbasis Teknologi Web Service

open access: diamond, 2011
Development of information technologies is often misused by an organization or a person to take criminal acts, such as the ability to steal and modify information in the data distribution for evil criminal purpose.
Slamet Widodo   +2 more
semanticscholar   +2 more sources

Home - About - Disclaimer - Privacy