Secure Combination of XML Signature Application with Message Aggregation in Multicast Settings

Author(s):  
Andreas Becker ◽  
Meiko Jensen
2011 ◽  
Vol 65 ◽  
pp. 236-240
Author(s):  
Bao Long Liu ◽  
Hua Chen ◽  
Yi Guo

XML signature is used to ensure XML data authentication. An XML multi-signature should satisfy multiple data authentication requirements for XML data which passes a hierarchical network of different responsibilities. Based on presented series-parallel XML multi-signature scheme, the implementation of a series-parallel XML multi-signature scheme is illustrated. The paper describes the algorithm for possible XPath in DTD, algorithm for series-parallel graph converting to sub-signing group, and the presentation for signed results.


Author(s):  
Wasim A Al-Hamdani

Cryptography has been used since ancient times in many different shapes and forms to protect messages from being intercepted. However, since 1976, cryptography started to be part of protected public communication when e-mail became commonly used by the public. Webmail (or Web-based e-mail) is an e-mail service intended to be primarily accessed via a web browser, as opposed to through an e-mail client, such as Microsoft Outlook, Mozilla‘s Thunderbird Mail. Very popular webmail providers include Gmail, Yahoo! Mail, Hotmail and AOL. Web based email has its advantages, especially for people who travel. Email can be collected by simply visiting a website, negating the need for an email client, or to logon from home. Wherever a public terminal with Internet access exists one can check, sends and receive email quickly and easily. Another advantage of web based email is that it provides an alternate address allowing user to reserve his/her ISP address for personal use. If someone would like to subscribe to a newsletter, enter a drawing, register at a website, participate in chats, or send feedback to a site, a web based email address is the perfect answer. It will keep non-personal mail on a server for you to check when you wish, rather than filling up your private email box. Web service is defined as “a software system designed to support interoperable machine-to-machine interaction over a network”. Web services are frequently just Internet application programming interfaces (API) that can be accessed over a network, such as the Internet, and executed on a remote system hosting the requested services. Other approaches with nearly the same functionality as web services are Object Management Group‘s (OMG) Common Object Request Broker Architecture (CORBA), Microsoft‘s Distributed Component Object Model (DCOM) or SUN‘s Java/Remote Method Invocation (RMI). Integrating Encryption with web service could be performing in many ways such as: XML Encryption and XML Signature. In this article we present client and Web-based E-mail, next generation E-mail and secure E-mail, followed by cryptography in web service and the last part is the future of web service security. The article start with the integration of cryptography with E-mail client and web base then the integration of cryptography and web service is presented. At the end of the major two sections: e-mail service and web service there is a general prospect vision of encryption future for e-mail service and web service. This section presents our view for the cryptography integration with the second generation of e-mail and web service.


Author(s):  
Manuel Mogollon

A service is an application offered by an organization that can be accessed through a programmable interface. Web services allow computers running on different operating platforms to access and share each other’s databases by using open standards, such as extensible markup language (XML) and simple object access protocol (SOAP). In this chapter, the following Web services mechanisms are discussed: (1) XML encryption, XML signature, and XML key management specification (XKMS); (2) security assertion markup language (SAML); and (3) Web services security (WS-security).


2019 ◽  
Vol 892 ◽  
pp. 249-257
Author(s):  
Madihah Mohd Saudi ◽  
Nurzi Juana Mohd Zaizi ◽  
Azreena Abu Bakar ◽  
Khaled Juma Ahmed Swessi

This paper introduces a new approach in countermeasuring XML signature wrapping attack called the Spatial Signature Algorithm (SSA). The motivation for proposing the SSA approach is due to the limitation of the SOAP (Simple Object Access Protocol) in handling the XML signature wrapping attacks. A different strategy is to be planned in order to deter such attack without extensive computational expense. Spatial Signature Algorithm builds upon the notion of ratio signature that is recommended by a research in biotechnology. The research suggests the possibility of diagnosing a specific disease based on the idea of ratios, specifically on the comparative relationship between elements to detect the emergence of certain threats. Bridging this notion to security, the principle of using space and ratio to detect abnormality is extended to the application of spatial information and digital signature to detect and combat the XML wrapping signature attack.


2012 ◽  
Vol 488-489 ◽  
pp. 1574-1581
Author(s):  
Wen Yong Weng ◽  
Jian Su ◽  
Xiao Jie Yang ◽  
Zhe Bing Wang

A confidentiality system generally needs to operate under a non-network environment. Hence, the adoption of an offline model is necessary to realize data sharing. An offline data-sharing model based on encrypted Extensible Markup Language (XML) files is designed. The combination of various techniques, such as XML mode, XML encryption, and XML signature, and the introduction of the Security Solution Support Center enable the proposed model to achieve a safe point-to-point data interactive mode and a security-based software module. The software system based on this model can ensure that data files generated from the data provider could only be identified and verified by the authorized data receiver.


Sign in / Sign up

Export Citation Format

Share Document