Results 201 to 210 of about 638,600 (248)
Some of the next articles are maybe not open access.
Research on XML Data Structural-Integrity in XML Signature
Applied Mechanics and Materials, 2014With the extensive application of XML, especially in e-commerce field, XML data security has become the focus of people, which particularly shows in its structural attack specific to the location relation to elements in tree structure. Combined with the characteristics of tree structure of XML data as well as the basic features of traversing binary ...
Hua Chen +3 more
semanticscholar +2 more sources
Applying XML Signature and XML Encryption to Peer-to-Peer Platform Security
H. Sumino +4 more
semanticscholar +3 more sources
XML signature element wrapping attacks and countermeasures
Proceedings of the 2005 workshop on Secure web services, 2005Naive use of XML Signature may result in signed documents remaining vulnerable to undetected modification by an adversary. In the typical usage of XML Signature to protect SOAP messages, an adversary may be capable of modifying valid messages in order to gain unauthorized access to protected resources.This paper describes the general vulnerability and ...
Michael McIntosh, P. Austel
semanticscholar +2 more sources
A comprehensive presentation to XML signature and encryption
2013 International Conference on Recent Trends in Information Technology (ICRTIT), 2013XML has been widely adopted for information exchange across various networks due to flexibility providing common syntax for messaging systems. XML documents may contain private information that cannot be shared by all user communities. Therefore, XML Security has a great importance to the overall security of the distributed systems.
A. El-Aziz, A. Kannan
semanticscholar +2 more sources
XML Signature Extensibility Using Custom Transforms
WISE, 2004The XML Signature specification defines a set of algorithms to be used to ensure security and application inter-operability for content signed using an XML Signature. We discuss a limitation of the XML Signature that arises from its extensibility to cater for new algorithms, and that is likely to be encountered in real-world implementations. We propose
Laurence Bull, D. Squire
semanticscholar +2 more sources
Introduction to XML Encryption and XML Signature
Information Security Technical Report, 2004Berin Lautenbach
semanticscholar +2 more sources
XML-Signature XPath Filter 2.0
Request for Comments, 2003J. Boyer +2 more
semanticscholar +2 more sources
Documentācentric XML workflows with fragment digital signatures
AbstractThe use of digital document management and processing is increasing. Traditional workflows of paper forms are being replaced by electronic workflows of digital documents. These workflows often require multiple signatures to be added to the documents for authorization and/or integrity.
Phillip J. Brooke +2 more
openaire +2 more sources
Choosing Optimal Platform to Host Web Services with XML Signature and XML Encryption
Journal of Next Generation Information Technology, 2013Sasko Ristov, M. Gusev
semanticscholar +2 more sources
International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06), 2006
Extensible markup language (XML) has become an important universal language for the Internet-based business world. An XML document can be generated from various resources with varying security requirements. In order to ensure the integrity of the contents in the transactions, to maintain privacy and confidentiality, security is increasingly important ...
null Lili Sun, null Yan Li
openaire +1 more source
Extensible markup language (XML) has become an important universal language for the Internet-based business world. An XML document can be generated from various resources with varying security requirements. In order to ensure the integrity of the contents in the transactions, to maintain privacy and confidentiality, security is increasingly important ...
null Lili Sun, null Yan Li
openaire +1 more source

