Results 1 to 10 of about 638,581 (229)
Spatial Signature Method (SSM) Against XML Signature Wrapping Attacks [PDF]
Living in cyber world with revolutionizes of Industrial 4.0, most of the users and organisations prefer to sell and buy products or services via website online transaction.
Saudi Madihah Mohd +3 more
doaj +4 more sources
New XML Signature Scheme That is Resistant to Some Attacks [PDF]
Supporting the execution of transactions through the use of electronic documents requires security. The scope of this security primarily involves ensuring the integrity, authenticity and non-repudiation of the origin of information.
Gerard Wawrzyniak, Imed El Fray
doaj +3 more sources
XML Encryption and Signature for Securing Web Services
In this research, we have focused on the most challenging issue that Web Services face, i.e. how to secure their information. Web Services security could be guaranteed by employing security standards, which is the main focus of this search. Every suggested model related to security design should put in the account the securities' objectives; integrity,
Iehab Alrassan
semanticscholar +5 more sources
XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany [PDF]
XML Signature Wrapping (XSW) has been a relevant threat to web services for 15 years until today. Using the Personal Health Record (PHR), which is currently under development in Germany, we investigate a current SOAP-based web services system as a case ...
Paul Höller +2 more
semanticscholar +5 more sources
XML Signature Requirements [PDF]
Joseph M. Reagle
semanticscholar +3 more sources
On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks [PDF]
In the context of security of Web Services, the XML Signature Wrapping attack technique has lately received increasing attention. Following a broad range of real-world exploits, general interest in applicable countermeasures rises. However, few approaches for countering these attacks have been investigated closely enough to make any claims about their ...
Meiko Jensen +3 more
semanticscholar +3 more sources
Securing Web Services Using XML Signature and XML Encryption [PDF]
6 pages, 8 figures, 1 ...
Saravanaguru, RA. K. +3 more
openaire +3 more sources
VOEvent authentication via XML digital signature [PDF]
AbstractA trivial modification to the XML schema of VOEvent v1.1 allows the inclusion of W3C digital signatures. Signatures enable identification, identification enables trust, and trust enables authorization. Such changes would inhibit abuse of the VOEvent networks. (© 2008 WILEY‐VCH Verlag GmbH & Co. KGaA, Weinheim)
Summer L. Allen
openaire +2 more sources
Web Services Security Based on XML Signature and XML Encryption
With the development of web services application, some issues of web services security are increasingly prominent. As a platform-independent language, XML is widely used for its high expansibility. After analysis the traditional web services security technology, this paper formulates the XML signature and encryption as the core of web services security
Yue-sheng Gu, Meng-tao Ye, Yong Gan
semanticscholar +2 more sources
Development of information technologies is often misused by an organization or a person to take criminal acts, such as the ability to steal and modify information in the data distribution for evil criminal purpose.
Slamet Widodo +2 more
semanticscholar +2 more sources

