Hwang et al., 2004 - Google Patents
An operational model and language support for securing XML documentsHwang et al., 2004
- Document ID
- 10561028677299292051
- Author
- Hwang G
- Chang T
- Publication year
- Publication venue
- Computers & Security
External Links
Snippet
In this paper we present an operational model for XML document security. Given an XML document X, the operational model defines the process of encrypting data and embedding digital signatures which sign the data in X. The secured XML document Xs includes …
- 230000001131 transforming 0 abstract description 38
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
- G06F2221/0722—Content
- G06F2221/0737—Traceability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
- G06F2221/0751—Key
- G06F2221/0755—Generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101477295B1 (en) | Format-agnostic system and method for issuing certificates | |
CA2716982C (en) | Digital signatures on composite resource documents | |
US20040078577A1 (en) | Method and apparatus for providing xml document encryption | |
US20020184485A1 (en) | Method for electronic communication providing self-encrypting and self-verification capabilities | |
Wu et al. | Redactable signatures for signed CDA documents | |
Young | Verifiable credentials flavors explained | |
Giereth | On partial encryption of rdf-graphs | |
Hwang et al. | An operational model and language support for securing XML documents | |
Eastlake et al. | Secure XML: The New Syntax for Signatures and Encryption | |
JP2004260366A (en) | Xml signing/ciphering procedure generating system | |
Imamura et al. | A stream-based implementation of XML encryption | |
CN109150516A (en) | The signature and/or encryption method of browser file, device, browser and medium | |
Hofmeier et al. | Enabling the JSON web signature format to support complex and identity-oriented non-web processes | |
López et al. | XML-based distributed access control system | |
Lee et al. | Towards standards-compliant trust negotiation for web services | |
Larrucea et al. | ISOAS: Through an independent SOA Security specification | |
Hwang et al. | An operational model and language support for securing web services | |
Berbecaru et al. | A Practical Approach to expressing digitally signed documents | |
Al-Hamdani | XML security in healthcare web systems | |
Rao et al. | Exploiting XML Dom for Restricted Access of Information | |
Wawrzyniak et al. | Concept of an electronic form based on XML that ensures a high level of interoperability and security. | |
Hwang et al. | Towards the Security of XML Documents | |
Geuer-Pollmann | Confidentiality of XML documents by Pool Encryption | |
Abd El-Aziz et al. | A comprehensive presentation to XML signature and encryption | |
Berbecaru et al. | Towards concrete application of electronic signature |