Results 211 to 220 of about 638,600 (248)
Some of the next articles are maybe not open access.

Spatial Signature Algorithm (SSA): A New Approach in Countermeasuring XML Signature Wrapping Attack

Applied Mechanics and Materials, 2019
This paper introduces a new approach in countermeasuring XML signature wrapping attack called the Spatial Signature Algorithm (SSA). The motivation for proposing the SSA approach is due to the limitation of the SOAP (Simple Object Access Protocol) in ...
M. Saudi   +3 more
semanticscholar   +1 more source

Implementation an XML Multi-Signature Scheme for XML Data Authentication

Applied Mechanics and Materials, 2011
XML signature is used to ensure XML data authentication. An XML multi-signature should satisfy multiple data authentication requirements for XML data which passes a hierarchical network of different responsibilities. Based on presented series-parallel XML multi-signature scheme, the implementation of a series-parallel XML multi-signature scheme is ...
Bao Long Liu, Hua Chen, Yi Guo
openaire   +1 more source

XML Signature Wrapping Angriffe wirksam unterbinden

Datenschutz und Datensicherheit - DuD, 2012
Bereits im Jahr 2005 wurde eine systematische Schwachstelle von XMLSignaturen aufgedeckt: Ein signiertes XMLDokument kann umgestaltet oder erganzt werden, ohne dass die zugehorige XMLSignatur ungultig wird. In DuD 9/2009 stellten die Autoren diesen Angriff vor; im vorliegenden Beitrag prasentieren sie ein im Auftrag des BSI entwickeltes Losungskonzept,
Meiko Jensen   +4 more
openaire   +1 more source

XML Encryption and Signatures

2002
In this chapter, I’ll talk about the Extensible Markup Language (XML) Encryption and Signatures specifications. These specifications are important for cryptography developers, as XML is now used in business data exchange and system interoperability protocols.
Jason Bock   +3 more
openaire   +1 more source

Content Extraction Signatures using XML Digital Signatures and Custom Transforms On-Demand

2022
In this paper we describe our work in developing custom transform algorithms to expand the functionality of an XML Signature to include Content Extraction Signature functionality. This functionality includes extraction policy verification into the XML Signature Core Validation. Also included is a custom revocation mechanism.
Bull, L, Stanski, P, Squire, D
openaire   +1 more source

Streaming-Based Verification of XML Signatures in SOAP Messages

2010 6th World Congress on Services, 2010
WS-Security is a standard providing message-level security in Web Services. Therewith, it ensures their integrity, confidentiality, and authenticity. However, using sophisticated security algorithms can lead to high memory consumptions and long evaluation times.
Somorovsky, Juraj   +2 more
openaire   +2 more sources

Processing XML Queries with Tree Signatures

2003
With the rapidly increasing popularity of XML for data representation, there is a lot of interest in query processing over data that conforms to a labeled-tree data model. A variety of languages have been proposed for this purpose, all of which can be viewed as consisting of a pattern language and construction expressions.
Zezula P, Amato G, Rabitti F
openaire   +3 more sources

XML Signature Extensibility Using Signer-Specified Custom Transforms

2022
In this paper we further investigate the extensibility of the XML Signature using custom transforms to achieve additional functionality. We introduce a new custom transform and XML Signature structure that overcomes fragment scope restriction in the XML signature Core Validation process.
Bull, L, Squire, D
openaire   +1 more source

XML Signatures and Encryption

2016
Many XML uses today need security, particularly in terms of authentication and confidentiality. Consider commercial transactions. It should be clear why purchase orders, payments, delivery receipts, contracts, and the like need authentication. In many cases, particularly when the transaction involves multiple parties, different parts of a message need ...
openaire   +1 more source

Efficient preprocessing of XML queries using structured signatures

Information Processing Letters, 2003
The paper proposes a preprocessing scheme for efficient processing of XML queries in XML-based information retrieval systems. For the preprocessing, we use a signature-based approach. In the conventional (flat document-based) information retrieval systems, user queries consist of keywords and boolean operators, and thus signatures are structured in a ...
Chung, YD   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy