메뉴 건너뛰기




Volumn 4, Issue 3, 2004, Pages 208-222

A hierarchical extraction policy for content extraction signatures: Selectively handling verifiable digital content

Author keywords

Content extraction signatures; Hierarchical extraction policy; Privacy enhancing signatures; Selective content disclosure; Xml signature custom transforms

Indexed keywords


EID: 36348956669     PISSN: 14325012     EISSN: 14321300     Source Type: Journal    
DOI: 10.1007/s00799-004-0082-z     Document Type: Article
Times cited : (15)

References (22)
  • 1
    • 0141751864 scopus 로고    scopus 로고
    • XML-signature syntax and processing
    • In: Eastlake D, Reagle J, Solo D (eds), 12 February 2002, Last accessed: 21 May 2004
    • Bartel M, Boyer J, Fox B, LaMacchia B, Simon E (2002) XML-signature syntax and processing. In: Eastlake D, Reagle J, Solo D (eds) W3C Recommendation. World Wide Web Consortium, 12 February 2002. http://www.w3.org/TR/2002/REC-xmldsig-core-20020212/. Last accessed: 21 May 2004
    • (2002) W3C Recommendation. World Wide Web Consortium
    • Bartel, M.1    Boyer, J.2    Fox, B.3    Lamacchia, B.4    Simon, E.5
  • 4
    • 84867536823 scopus 로고
    • 3-6 July 1992. EISS Workshop Oberwolfach Final Report. Lecture notes in computer science, Springer, Berlin Heidelberg New York
    • Beth T, Frisch M, Simmons GJ (eds) (1992) In: Publickey cryptography: state of the art and future directions, 3-6 July 1992. EISS Workshop Oberwolfach Final Report. Lecture notes in computer science, vol 578. Springer, Berlin Heidelberg New York
    • (1992) Publickey Cryptography: State of the Art and Future Directions , vol.578
    • Beth, T.1    Frisch, M.2    Simmons, G.J.3
  • 5
    • 0032667876 scopus 로고    scopus 로고
    • Twenty years of cryptography in the open literature
    • Oakland, CA, 9-12 May 1999. IEEE Press, New York
    • Blakley GR (1999) Twenty years of cryptography in the open literature. In: Proc. 1999 IEEE symposium on security and privacy, Oakland, CA, 9-12 May 1999. IEEE Press, New York, pp 106-107
    • (1999) Proc. 1999 IEEE Symposium On Security and Privacy , pp. 106-107
    • Blakley, G.R.1
  • 9
    • 63449096221 scopus 로고    scopus 로고
    • Grouping verifiable content for selective disclosure
    • In: Safavi-Naini R, Seberry J, Wollongong, Australia, 9-11 July 2003. Lecture notes in computer science, Springer, Berlin Heidelberg New York
    • Bull L, McG Squire D, Newmarch J, Zheng Y (2003) Grouping verifiable content for selective disclosure. In: Safavi-Naini R, Seberry J (eds) Proc. 8th Australasian conference on information security and privacy (ACISP 2003), Wollongong, Australia, 9-11 July 2003. Lecture notes in computer science, vol 2727. Springer, Berlin Heidelberg New York, pp 1-12
    • (2003) Proc. 8th Australasian Conference On Information Security and Privacy (ACISP 2003) , vol.2727 , pp. 1-12
    • Bull, L.1    McG, S.D.2    Newmarch, J.3    Zheng, Y.4
  • 10
    • 78650194226 scopus 로고    scopus 로고
    • Content extraction signatures using XML digital signatures and custom transforms on-demand
    • Budapest, Hungary, 20-24 May 2003. ACM Press, New York, Last accessed: 21 May, 2004
    • Bull L, Stanski P, McG Squire D (2003) Content extraction signatures using XML digital signatures and custom transforms on-demand. In: Proc. 12th international World Wide Web conference (WWW2003), Budapest, Hungary, 20-24 May 2003. ACM Press, New York, pp 170-177. http://www2003.org/cdrom/papers/refereed/p838/p838-bull.html. Last accessed: 21 May, 2004
    • (2003) Proc. 12th International World Wide Web Conference (WWW2003) , pp. 170-177
    • Bull, L.1    Stanski, P.2    McG, S.D.3
  • 14
    • 50949122471 scopus 로고    scopus 로고
    • IETF, Last accessed: 21 May 2004
    • IETF (2004) The Internet Engineering Task Force. http://www.ietf.org/. Last accessed: 21 May 2004
    • (2004) The Internet Engineering Task Force
  • 15
    • 84944905011 scopus 로고    scopus 로고
    • Homomorphic signature schemes
    • In: Preneel B, San Jose, CA, 18-22 February 2002. Lecture notes in computer science, Springer, Berlin Heidelberg New York
    • Johnson R, Molnar D, Song D, Wagner D (2002) Homomorphic signature schemes. In: Preneel B (ed) Topics in Cryptology - CT-RSA 2002: the cryptographer's track at the RSA conference 2002, San Jose, CA, 18-22 February 2002. Lecture notes in computer science, vol 2271. Springer, Berlin Heidelberg New York, pp 244-62
    • (2002) Topics In Cryptology - CT-RSA 2002: The Cryptographer's Track At the RSA Conference 2002 , vol.2271 , pp. 244-262
    • Johnson, R.1    Molnar, D.2    Song, D.3    Wagner, D.4
  • 17
    • 84944878224 scopus 로고    scopus 로고
    • Transitive signature schemes
    • In: Preneel B, San Jose, CA, 18-22 February. Lecture notes in computer science, Springer, Berlin Heidelberg New York
    • Micali S, Rivest RL (2002) Transitive signature schemes. In: Preneel B (ed) Topics in Cryptology - CT-RSA 2002: the cryptographer's track at the RSA Conference 2002, San Jose, CA, 18-22 February. Lecture notes in computer science, vol 2271. Springer, Berlin Heidelberg New York, pp 236-243
    • (2002) Topics In Cryptology - CT-RSA 2002: The Cryptographer's Track At the RSA Conference 2002 , vol.2271 , pp. 236-243
    • Micali, S.1    Rivest, R.L.2
  • 18
    • 0003508562 scopus 로고
    • NIST, Number 186 in Federal Information Processing Standards publication. National Institute of Standards and Technology, May 1994, Last accessed: 7 April 2004
    • NIST (1994) Digital Signature Standard (DSS). Number 186 in Federal Information Processing Standards publication. National Institute of Standards and Technology, May 1994. http://www.itl.nist.gov/fipspubs/fip186.htm. Last accessed: 7 April 2004
    • (1994) Digital Signature Standard (DSS)
  • 19
    • 0141894805 scopus 로고    scopus 로고
    • Authenticating distributed data using web services and XML signatures
    • New York, 22 November 2002. ACM Press, New York
    • Polivy DJ, Tamassia R (2002) Authenticating distributed data using web services and XML signatures. In: Proc. 2002 ACM workshop on XML security (XMLSEC-02), New York, 22 November 2002. ACM Press, New York, pp 80-89
    • (2002) Proc. 2002 ACM Workshop On XML Security (XMLSEC-02) , pp. 80-89
    • Polivy, D.J.1    Tamassia, R.2
  • 20
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120-8
    • (1978) Commun ACM , vol.21 , Issue.2 , pp. 120-128
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 21
    • 84949982830 scopus 로고    scopus 로고
    • Content extraction signatures
    • In: Kim K, Seoul, Korea, 6-7 December 2001. Lecture notes in computer science, Springer, Berlin Heidelberg New York
    • Steinfeld R, Bull L, Zheng Y (2001) Content extraction signatures. In: Kim K (ed) Proc. 4th international conference on information security and cryptology (ICISC 2001), Seoul, Korea, 6-7 December 2001. Lecture notes in computer science, vol 2288. Springer, Berlin Heidelberg New York, pp 285-304
    • (2001) Proc. 4th International Conference On Information Security and Cryptology (ICISC 2001) , vol.2288 , pp. 285-304
    • Steinfeld, R.1    Bull, L.2    Zheng, Y.3
  • 22
    • 0004135793 scopus 로고    scopus 로고
    • World Wide Web Consortium, Available online, Last accessed: 21 May 2004
    • World Wide Web Consortium (2004) The World Wide Web Consortium. Available online. http://www.w3.org/ -Last accessed: 21 May 2004
    • (2004) The World Wide Web Consortium


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.