메뉴 건너뛰기




Volumn 81, Issue 10, 2008, Pages 1715-1724

XML security - A comparative literature review

Author keywords

Privacy; Web services; XML encryption; XML key management; XML security; XML signature

Indexed keywords

CONCENTRATION (PROCESS); CRYPTOGRAPHY; INFORMATION MANAGEMENT; MARKUP LANGUAGES; STANDARDIZATION; STANDARDS;

EID: 48649102412     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2007.12.763     Document Type: Article
Times cited : (24)

References (55)
  • 1
  • 4
    • 3543114416 scopus 로고    scopus 로고
    • Bulletproof business process automation: securing XML forms with document subset signatures
    • ACM Press
    • Boyer J.M. Bulletproof business process automation: securing XML forms with document subset signatures. XMLSEC'03: Proceedings of the 2003 ACM Workshop on XML security (2003), ACM Press 104-111
    • (2003) XMLSEC'03: Proceedings of the 2003 ACM Workshop on XML security , pp. 104-111
    • Boyer, J.M.1
  • 5
    • 48649090287 scopus 로고    scopus 로고
    • Boyer, J., 2006. Applying XML signatures to xforms-based documents, in 'XML Conference 2006, Boston, USA'. .
    • Boyer, J., 2006. Applying XML signatures to xforms-based documents, in 'XML Conference 2006, Boston, USA'. .
  • 6
    • 48649110121 scopus 로고    scopus 로고
    • Boyer, J., Landwehr, D., Merrick, R., Raman, T., Dubinko, M. Klotz, L., 2006. 'Xforms 1.0 (second edition) W3C recommendation'. .
    • Boyer, J., Landwehr, D., Merrick, R., Raman, T., Dubinko, M. Klotz, L., 2006. 'Xforms 1.0 (second edition) W3C recommendation'. .
  • 7
    • 35048867956 scopus 로고    scopus 로고
    • XML signature extensibility using custom transforms
    • Springer, Berlin/Heidelberg
    • Bull L., and Squire D.M. XML signature extensibility using custom transforms. Web Information Systems (WISE 2004) vol. 3306 (2004), Springer, Berlin/Heidelberg 102-112
    • (2004) Web Information Systems (WISE 2004) , vol.3306 , pp. 102-112
    • Bull, L.1    Squire, D.M.2
  • 9
  • 11
    • 34248523976 scopus 로고    scopus 로고
    • The design and implementation of an application program interface for securing XML documents
    • Chang T.-K., and Hwang G.-H. The design and implementation of an application program interface for securing XML documents. Journal of Systems and Software 80 8 (2007) 1362-1374
    • (2007) Journal of Systems and Software , vol.80 , Issue.8 , pp. 1362-1374
    • Chang, T.-K.1    Hwang, G.-H.2
  • 13
    • 33745901284 scopus 로고    scopus 로고
    • XML security model for secure information exchange in e-commerce
    • Springer, Berlin/Heidelberg
    • Cho K.M. XML security model for secure information exchange in e-commerce. Computational Science and Its Applications - ICCSA 2006' vol. 3983 (2006), Springer, Berlin/Heidelberg 1003-1011
    • (2006) Computational Science and Its Applications - ICCSA 2006' , vol.3983 , pp. 1003-1011
    • Cho, K.M.1
  • 14
    • 48649086330 scopus 로고    scopus 로고
    • Broker-based secure negotiation of intellectual property rights
    • Springer, Berlin/Heidelberg
    • Delgado J., Gallego I., and Perramon X. Broker-based secure negotiation of intellectual property rights. Information security vol. 2200 (2001), Springer, Berlin/Heidelberg
    • (2001) Information security , vol.2200
    • Delgado, J.1    Gallego, I.2    Perramon, X.3
  • 16
    • 33646417902 scopus 로고    scopus 로고
    • On partial encryption of RDF-graphs
    • Springer, Berlin/Heidelberg
    • Giereth M. On partial encryption of RDF-graphs. The Semantic Web (ISWC 2005) vol. 3729 (2005), Springer, Berlin/Heidelberg 308-322
    • (2005) The Semantic Web (ISWC 2005) , vol.3729 , pp. 308-322
    • Giereth, M.1
  • 17
    • 31144470987 scopus 로고    scopus 로고
    • Evaluation of certificate validation mechanisms
    • Hormann T.P., Wrona K., and Holtmanns S. Evaluation of certificate validation mechanisms. Computer Communications 29 3 (2006) 291-305
    • (2006) Computer Communications , vol.29 , Issue.3 , pp. 291-305
    • Hormann, T.P.1    Wrona, K.2    Holtmanns, S.3
  • 18
    • 5044251650 scopus 로고    scopus 로고
    • Development of an e-diagnostics/maintenance framework for semiconductor factories with security considerations
    • Hung M.-H., Chen K.-Y., Ho R.-W., and Cheng F.-T. Development of an e-diagnostics/maintenance framework for semiconductor factories with security considerations. Advanced Engineering Informatics 17 3-4 (2003) 165-178
    • (2003) Advanced Engineering Informatics , vol.17 , Issue.3-4 , pp. 165-178
    • Hung, M.-H.1    Chen, K.-Y.2    Ho, R.-W.3    Cheng, F.-T.4
  • 20
    • 4544375498 scopus 로고    scopus 로고
    • An operational model and language support for securing XML documents
    • Hwang G.-H., and Chang T.-K. An operational model and language support for securing XML documents. Computers and security 23 6 (2004) 498-529
    • (2004) Computers and security , vol.23 , Issue.6 , pp. 498-529
    • Hwang, G.-H.1    Chang, T.-K.2
  • 24
    • 33646160210 scopus 로고    scopus 로고
    • Trustworthy verification and visualisation of multiple XML-signatures
    • Springer, Berlin/Heidelberg
    • Kubbilun W., Gajek S., Psarros M., and Schwenk J. Trustworthy verification and visualisation of multiple XML-signatures. Communications and Multimedia security vol. 3677 (2005), Springer, Berlin/Heidelberg 311-320
    • (2005) Communications and Multimedia security , vol.3677 , pp. 311-320
    • Kubbilun, W.1    Gajek, S.2    Psarros, M.3    Schwenk, J.4
  • 27
    • 33646887480 scopus 로고    scopus 로고
    • Secure knowledge management and the semantic web
    • Lee J., Upadhyaya S.J., Rao H.R., and Sharman R. Secure knowledge management and the semantic web. Communication ACM 48 12 (2005) 48-54
    • (2005) Communication ACM , vol.48 , Issue.12 , pp. 48-54
    • Lee, J.1    Upadhyaya, S.J.2    Rao, H.R.3    Sharman, R.4
  • 32
    • 33749346327 scopus 로고    scopus 로고
    • Hands-on, simulated, and remote laboratories: a comparative literature review
    • Ma J., and Nickerson J.V. Hands-on, simulated, and remote laboratories: a comparative literature review. ACM Computer Survey 38 3 (2006) 7
    • (2006) ACM Computer Survey , vol.38 , Issue.3 , pp. 7
    • Ma, J.1    Nickerson, J.V.2
  • 35
    • 33646143991 scopus 로고    scopus 로고
    • XML security in the next generation optical disc context
    • Springer, Berlin/Heidelberg
    • Nair G.G., Gopalakrishnan A., Mauw S., and Moll E. XML security in the next generation optical disc context. Secure Data Management vol. 3674 (2005), Springer, Berlin/Heidelberg 217-233
    • (2005) Secure Data Management , vol.3674 , pp. 217-233
    • Nair, G.G.1    Gopalakrishnan, A.2    Mauw, S.3    Moll, E.4
  • 39
    • 35048893526 scopus 로고    scopus 로고
    • Certificate validation scheme of open grid service usage XKMS
    • Springer, Berlin/Heidelberg
    • Park N., Moon K., Sohn S., and Park C. Certificate validation scheme of open grid service usage XKMS. Grid and Cooperative Computing vol. 3032 (2004), Springer, Berlin/Heidelberg 849-858
    • (2004) Grid and Cooperative Computing , vol.3032 , pp. 849-858
    • Park, N.1    Moon, K.2    Sohn, S.3    Park, C.4
  • 40
    • 24944482276 scopus 로고    scopus 로고
    • Development of XKMS-based service component for using PKI in XML web services environment
    • Springer, Berlin/Heidelberg
    • Park N., Moon K., Jang J., and Sohn S. Development of XKMS-based service component for using PKI in XML web services environment. Computational Science and Its Applications - ICCSA 2004 vol. 3043 (2004), Springer, Berlin/Heidelberg 784-791
    • (2004) Computational Science and Its Applications - ICCSA 2004 , vol.3043 , pp. 784-791
    • Park, N.1    Moon, K.2    Jang, J.3    Sohn, S.4
  • 41
    • 35048821556 scopus 로고    scopus 로고
    • Middleware framework for secure grid application in mobile web services environment
    • Springer, Berlin/Heidelberg
    • Park N., Moon K., Jang J., and Sohn S. Middleware framework for secure grid application in mobile web services environment. Grid and Cooperative Computing - GCC 2004 Workshops vol. 3252 (2004), Springer, Berlin/Heidelberg 406-413
    • (2004) Grid and Cooperative Computing - GCC 2004 Workshops , vol.3252 , pp. 406-413
    • Park, N.1    Moon, K.2    Jang, J.3    Sohn, S.4
  • 42
    • 35048855100 scopus 로고    scopus 로고
    • A XKMS-based security framework for mobile grid into the XML web services
    • Springer, Berlin/Heidelberg
    • Park N., Moon K., Jang J., and Sohn S. A XKMS-based security framework for mobile grid into the XML web services. Computational Science - ICCS 2004' vol. 3038 (2004), Springer, Berlin/Heidelberg 124-132
    • (2004) Computational Science - ICCS 2004' , vol.3038 , pp. 124-132
    • Park, N.1    Moon, K.2    Jang, J.3    Sohn, S.4
  • 43
    • 26944452397 scopus 로고    scopus 로고
    • XKMS-based key management for open lbs in web services environment
    • Springer, Berlin/Heidelberg
    • Park N., Kim H., Chung K., Kim S., and Won D. XKMS-based key management for open lbs in web services environment. Advances in Web Intelligence vol. 3528 (2005), Springer, Berlin/Heidelberg 367-373
    • (2005) Advances in Web Intelligence , vol.3528 , pp. 367-373
    • Park, N.1    Kim, H.2    Chung, K.3    Kim, S.4    Won, D.5
  • 46
    • 33745963191 scopus 로고    scopus 로고
    • XML-signcryption based lbs security protocol acceleration methods in mobile distributed computing
    • Springer, Berlin/Heidelberg
    • Park N., Kim H., Chung K., Sohn S., and Won D. XML-signcryption based lbs security protocol acceleration methods in mobile distributed computing. Computational Science and Its Applications - ICCSA 2006' vol. 3984 (2006), Springer, Berlin/Heidelberg 251-259
    • (2006) Computational Science and Its Applications - ICCSA 2006' , vol.3984 , pp. 251-259
    • Park, N.1    Kim, H.2    Chung, K.3    Sohn, S.4    Won, D.5
  • 48
    • 48649108886 scopus 로고    scopus 로고
    • Project, P.I.A.L., 2007. 'Wireless internet access'. .
    • Project, P.I.A.L., 2007. 'Wireless internet access'. .
  • 49
    • 33646157491 scopus 로고    scopus 로고
    • Experience XML security
    • Springer, Berlin
    • Schadow D. Experience XML security. Communications and Multimedia security vol. 3677 (2005), Springer, Berlin 321-329
    • (2005) Communications and Multimedia security , vol.3677 , pp. 321-329
    • Schadow, D.1
  • 53
    • 27544457180 scopus 로고    scopus 로고
    • Wei, L., Chiu, K., Slominski, A., Gannon, D., 2005. A streaming validation model for soap digital signature. In: Proceedings of the 14th IEEE International Symposium on High Performance Distributed Computing, pp. 243-252.
    • Wei, L., Chiu, K., Slominski, A., Gannon, D., 2005. A streaming validation model for soap digital signature. In: Proceedings of the 14th IEEE International Symposium on High Performance Distributed Computing, pp. 243-252.
  • 54
    • 33746052820 scopus 로고    scopus 로고
    • An efficient approach to support querying secure out sourced XML information
    • Springer, Berlin/Heidelberg
    • Yang Y., Ng W., Lau H.L., and Cheng J. An efficient approach to support querying secure out sourced XML information. Advanced Information Systems Engineering vol. 4001 (2006), Springer, Berlin/Heidelberg 157-171
    • (2006) Advanced Information Systems Engineering , vol.4001 , pp. 157-171
    • Yang, Y.1    Ng, W.2    Lau, H.L.3    Cheng, J.4
  • 55
    • 35048844861 scopus 로고    scopus 로고
    • Constructing secure web service based on XML
    • Springer, Berlin/Heidelberg
    • Zhang S., Wang B., and Zhou L. Constructing secure web service based on XML. Grid and Cooperative Computing vol. 3032 (2004), Springer, Berlin/Heidelberg 1051-1054
    • (2004) Grid and Cooperative Computing , vol.3032 , pp. 1051-1054
    • Zhang, S.1    Wang, B.2    Zhou, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.