Results 21 to 30 of about 638,600 (248)

XML ENCRYPTION AND XML SIGNATURE FOR WEB SERVICE SECURITY

open access: diamondInternational Journal of Advance Engineering and Research Development, 2015
openaire   +2 more sources

Expressiveness Considerations of XML Signatures [PDF]

open access: yes2011 IEEE 35th Annual Computer Software and Applications Conference Workshops, 2011
XML Signatures are used to protect XML-based Web Service communication against a broad range of attacks related to man-in-the-middle scenarios. However, due to the complexity of the Web Services specification landscape, the task of applying XML Signatures in a robust and reliable manner becomes more and more challenging.
Jensen, Meiko, Meyer, Christopher
openaire   +2 more sources

REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]

open access: yes, 2020
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall   +2 more
core   +2 more sources

Protection of Semantic Organized Data. Encryption of RDF Graph

open access: yesDigital Presentation and Preservation of Cultural and Scientific Heritage, 2014
The problems of protection of semantic organized data and encryption of RDF graph are investigated. Technologies used in the construction of a semantic network are presented.
Galina Bogdanova   +2 more
doaj   +1 more source

XML Security in Certificate Management - XML Certificator [PDF]

open access: yes, 2009
The trend of rapid growing use of XML format in data/document management system reveals that security measures should be urgently considered into next generation's data/document systems.
Cripps, Nathan, Lu, Joan
core   +1 more source

Rancang Bangun Keamanan Web Service Dengan Metode Ws-Security

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2012
Abstrak Web service menggunakan teknologi XML dalam melakukan pertukaran data. Umumnya penggunaan web service terjadi pertukaran data ataupun informasi penting yang perlu dijaga keamanannya.
Ari Muzakir, Ahmad Ashari
doaj   +1 more source

La lógica matemática: una disciplina en busca de encuadre

open access: yesTheoria, 2010
We offer an analysis of the disciplinary transformations underwent by mathematical or symbolic logic since its emergence in the late 19th century.
José Ferreirós
doaj   +1 more source

La centralidad de la Fundación Rockefeller en el desarrollo de la biología molecular revisada: una extensión de la crítica de Abir-Am a la luz del modelo del operón

open access: yesTheoria, 2011
Abir-Am ha criticado la visión estándar de que la Fundación Rockefeller (FR) jugó un papel central en el surgimiento de la biología molecular durante la década de 1960.
Vivette García Deister
doaj   +1 more source

Content-Aware DataGuides for Indexing Large Collections of XML Documents [PDF]

open access: yes, 2003
XML is well-suited for modelling structured data with textual content. However, most indexing approaches perform structure and content matching independently, combining the retrieved path and keyword occurrences in a third step. This paper shows that
Bry, François   +3 more
core   +3 more sources

Home - About - Disclaimer - Privacy