Results 201 to 210 of about 638,600 (248)
Some of the next articles are maybe not open access.

Research on XML Data Structural-Integrity in XML Signature

Applied Mechanics and Materials, 2014
With the extensive application of XML, especially in e-commerce field, XML data security has become the focus of people, which particularly shows in its structural attack specific to the location relation to elements in tree structure. Combined with the characteristics of tree structure of XML data as well as the basic features of traversing binary ...
Hua Chen   +3 more
semanticscholar   +2 more sources

Applying XML Signature and XML Encryption to Peer-to-Peer Platform Security

open access: closed2007 4th IEEE Consumer Communications and Networking Conference, 2007
H. Sumino   +4 more
semanticscholar   +3 more sources

XML signature element wrapping attacks and countermeasures

Proceedings of the 2005 workshop on Secure web services, 2005
Naive use of XML Signature may result in signed documents remaining vulnerable to undetected modification by an adversary. In the typical usage of XML Signature to protect SOAP messages, an adversary may be capable of modifying valid messages in order to gain unauthorized access to protected resources.This paper describes the general vulnerability and ...
Michael McIntosh, P. Austel
semanticscholar   +2 more sources

A comprehensive presentation to XML signature and encryption

2013 International Conference on Recent Trends in Information Technology (ICRTIT), 2013
XML has been widely adopted for information exchange across various networks due to flexibility providing common syntax for messaging systems. XML documents may contain private information that cannot be shared by all user communities. Therefore, XML Security has a great importance to the overall security of the distributed systems.
A. El-Aziz, A. Kannan
semanticscholar   +2 more sources

XML Signature Extensibility Using Custom Transforms

WISE, 2004
The XML Signature specification defines a set of algorithms to be used to ensure security and application inter-operability for content signed using an XML Signature. We discuss a limitation of the XML Signature that arises from its extensibility to cater for new algorithms, and that is likely to be encountered in real-world implementations. We propose
Laurence Bull, D. Squire
semanticscholar   +2 more sources

Introduction to XML Encryption and XML Signature

Information Security Technical Report, 2004
Berin Lautenbach
semanticscholar   +2 more sources

XML-Signature XPath Filter 2.0

Request for Comments, 2003
J. Boyer   +2 more
semanticscholar   +2 more sources

Document‐centric XML workflows with fragment digital signatures

open access: closedSoftware: Practice and Experience, 2010
AbstractThe use of digital document management and processing is increasing. Traditional workflows of paper forms are being replaced by electronic workflows of digital documents. These workflows often require multiple signatures to be added to the documents for authorization and/or integrity.
Phillip J. Brooke   +2 more
openaire   +2 more sources

Choosing Optimal Platform to Host Web Services with XML Signature and XML Encryption

Journal of Next Generation Information Technology, 2013
Sasko Ristov, M. Gusev
semanticscholar   +2 more sources

XML undeniable signatures

International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06), 2006
Extensible markup language (XML) has become an important universal language for the Internet-based business world. An XML document can be generated from various resources with varying security requirements. In order to ensure the integrity of the contents in the transactions, to maintain privacy and confidentiality, security is increasingly important ...
null Lili Sun, null Yan Li
openaire   +1 more source

Home - About - Disclaimer - Privacy