• All Solutions All Solutions
    • Editage

      One platform for all researcher needs

    • Paperpal

      AI-powered academic writing assistant

    • R Discovery

      Your #1 AI companion for literature search

    • Mind the Graph

      AI tool for graphics, illustrations, and artwork

    Unlock unlimited use of all AI tools with the Editage Plus membership.

    Explore Editage Plus
  • Support All Solutions
    discovery@researcher.life
Discovery Logo
Paper
Search Paper
Cancel
Ask R Discovery
Features
  • Top Papers
  • Library
  • audio papers link Audio Papers
  • translate papers link Paper Translation
  • translate papers link Chrome Extension
Explore

Content Type

  • Preprints
  • Conference Papers
  • Journal Articles

More

  • Research Areas
  • Topics
  • Resources

XML Encryption Research Articles

  • Share Topic
  • Share on Facebook
  • Share on Twitter
  • Share on Mail
  • Share on SimilarCopy to clipboard
Follow Topic R Discovery
By following a topic, you will receive articles in your feed and get email alerts on round-ups.
Overview
56 Articles

Published in last 50 years

Related Topics

  • Encrypted Data
  • Encrypted Data
  • Encryption Scheme
  • Encryption Scheme
  • Encrypted Files
  • Encrypted Files
  • Database Encryption
  • Database Encryption

Articles published on XML Encryption

Authors
Select Authors
Journals
Select Journals
Duration
Select Duration
53 Search results
Sort by
Recency
A Novel encrypted XML streaming technique for indexing data on multiple channels

A Novel encrypted XML streaming technique for indexing data on multiple channels

Read full abstract
  • KSII Transactions on Internet and Information Systems
  • Jul 31, 2024
Open Access
Cite
Save

XML Encryption and Signature for Securing Web Services

In this research, we have focused on the most challenging issue that Web Services face, i.e. how to secure their information. Web Services security could be guaranteed by employing security standards, which is the main focus of this search. Every suggested model related to security design should put in the account the securities' objectives; integrity, confidentiality, non- repudiation, authentication, and authorization. The proposed model describes SOAP messages and the way to secure their contents. Due to the reason that SOAP message is the core of the exchanging information in Web Services, this research has developed a security model needed to ensure e-business security. The essence of our model depends on XML encryption and XML signature to encrypt and sign SOAP message. The proposed model looks forward to achieve a high speed of transaction and a strong level of security without jeopardizing the performance of transmission information.

Read full abstract
  • International Journal of Computer Science and Information Technology
  • Aug 31, 2020
  • Iehab Alrassan
Open Access
Cite
Save

XML Encryption and Signature for Securing Web Services

In this research, we have focused on the most challenging issue that Web Services face, i.e. how to secure their information. Web Services security could be guaranteed by employing security standards, which is the main focus of this search. Every suggested model related to security design should put in the account the securities' objectives; integrity, confidentiality, non- repudiation, authentication, and authorization. The proposed model describes SOAP messages and the way to secure their contents. Due to the reason that SOAP message is the core of the exchanging information in Web Services, this research has developed a security model needed to ensure e-business security. The essence of our model depends on XML encryption and XML signature to encrypt and sign SOAP message. The proposed model looks forward to achieve a high speed of transaction and a strong level of security without jeopardizing the performance of transmission information.

Read full abstract
  • Zenodo (CERN European Organization for Nuclear Research)
  • Jan 1, 2020
Cite
Save

An efficient stream structure for broadcasting the encrypted XML data in mobile wireless broadcast channels

In mobile wireless broadcast networks, XML data is encrypted before it is sent over the broadcast channel in order to ensure the confidentiality of XML data. In these networks, mobile clients must not have access to all the XML data; rather they should have access to some parts of the XML data that are relevant to them and to which they are authorized to have access. In this paper, a new encrypted XML data stream structure is proposed which supports the confidentiality of XML data over the broadcast channel. In our proposed stream structure, the size of encrypted XML data stream is reduced by grouping the paths, XML nodes, texts, and attributes together. The proposed structure includes several indexes to skip from irrelevant data over the broadcast channel. The experimental results demonstrate that the use of our proposed stream structure efficiently disseminates XML data in mobile wireless broadcast networks in a secure manner and the indexes in our proposed stream structure improve the performance of XML query processing over the encrypted XML data stream.

Read full abstract
  • The Journal of Supercomputing
  • Jun 17, 2019
  • Madeh Shokri + 1
Cite
Save

Design and Implementation of Special Chemical Management System Based on XML Encryption Principle

Design and Implementation of Special Chemical Management System Based on XML Encryption Principle

Read full abstract
  • DOAJ (DOAJ: Directory of Open Access Journals)
  • Dec 1, 2018
Cite
Save

Privacy-Preserving Attribute-Based Access Control Model for XML-Based Electronic Health Record System

Cloud-based electronic health record (EHR) systems enable medical documents to be exchanged between medical institutions; this is expected to contribute to improvements in various medical services in the future. However, as the system architecture becomes more complicated, cloud-based EHR systems may introduce additional security threats when compared with the existing singular systems. Thus, patients may experience exposure of private data that they do not wish to disclose. In order to protect the privacy of patients, many approaches have been proposed to provide access control to patient documents when providing health services. However, most current systems do not support fine-grained access control or take into account additional security factors such as encryption and digital signatures. In this paper, we propose a cloud-based EHR model that performs attribute-based access control using extensible access control markup language. Our EHR model, focused on security, performs partial encryption and uses electronic signatures when a patient’s document is sent to a document requester. We use XML encryption and XML digital signature technology. Our proposed model works efficiently by sending only the necessary information to the requesters who are authorized to treat the patient in question.

Read full abstract
  • IEEE Access
  • Jan 1, 2018
  • Kwangsoo Seol + 4
Open Access
Cite
Save

A smart service model in greenhouse environment using event‐based security based on wireless sensor network

SummaryIn the smart agricultural environment such as greenhouse or vertical farm, the automation process is performed using the environment sensors to maintain the growth of the crops. Currently, the system rely on the defined rule to perform automation, but the situation can turn catastrophic. With the interruption in the communication, data forging, or eavesdropping, the crops will be rotten and destroyed. Therefore, to maintain the automation without failure, the connection needs to be secure and tampering has to be avoided. In this paper, we discuss the security solution for the wireless sensor networks in the automated agricultural environment without any human intervention. The sink node that collects the sensor values organizes the data and transfer the data to the server, along with the XML encryption and private key mechanism for the communication. The secure protocol is used to make connection using the private key, XML ecryption prevents the system from eavesdropping, and forging. Some of the events discussed in the papers are EVNData, SENSORError, DDoSAttack, and ConnThreat. With the help of the event and the tag information, the data security and confidentiality is increased, for the better automation and crop growth.

Read full abstract
  • Concurrency and Computation: Practice and Experience
  • Aug 8, 2017
  • Saraswathi Sivamani + 4
Cite
Save

A model for aggregation and filtering on encrypted XML streams in fog computing

The Internet of Things provides visions of innovative services and domain-specific applications. With the development of Internet of Things services, various structural data need to be transferred ...

Read full abstract
  • International Journal of Distributed Sensor Networks
  • May 1, 2017
  • Jyun-Yao Huang + 3
Open Access
Cite
Save

A new structure and access mechanism for secure and efficient XML data broadcast in mobile wireless networks

A new structure for streaming the XML data is proposed which guarantees confidentiality of the XML data over the wireless stream.An access mechanism is proposed to efficiently process XML queries over the encrypted XML stream. Recently, the use of XML for data broadcasting in mobile wireless networks has gained many attentions. One of the most essential requirements for such networks is data confidentiality. In order to secure XML data broadcast in mobile wireless networks, mobile clients should obey a set of access authorizations specified on the original XML document. In such environments, mobile clients can only access authorized parts of encrypted XML stream based on their access authorizations. Several indexing methods have been proposed in order to have selective access to XML data over the XML stream. However, these indexing methods cannot be used for encrypted XML data. In this paper, we define a new structure for XML stream which supports data confidentiality of XML data over the wireless broadcast channel. We also define an access mechanism for our proposed structure to efficiently process XML queries over the encrypted XML stream. The experimental results demonstrate that the use of our proposed structure and access mechanism for XML data broadcast efficiently disseminates XML data in mobile wireless networks.

Read full abstract
  • Journal of Systems and Software
  • Nov 24, 2016
  • Babak Safabahar + 1
Cite
Save

Survey on Signatured Xml Encryption for Multi-Tier Web Services Security

Web service is the technology tied up with SOAP, UDDI and WSDL of XML format, so web services searching based on XML keyword become essential. By systematic monitoring it has been observed that internet communication is less protected than intranet communication. The transaction exchange held through internet in web which is one among the distributed application is embodied to different vulnerability. In distributed environment, messages and data are exchanged as Extensible Markup Language (XML) format for its vast compatibility in transit. For facing the competitive environment, any business teams have to find their suitable web services among the bulk services prevails in market. In apt to this, survey has been made with different searching techniques and way to boost the security container filled with access permitted service alone. Our research work on XML based Web security is concentrated on providing the privacy, certification and integrity. We investigate the way to regulate and insist the security by applying XML Encryption and Signature for data or messages in transaction and in storage form. It also proves the performance improvement in searching data from vast resources, if so security constraint is provided. Search Engines Optimization (SEO) is enhanced with parsing the descriptive tags rather than chaos data. Traders need not have prior knowledge of web farms lifecycle and its protection.

Read full abstract
  • Indian Journal of Science and Technology
  • May 10, 2016
  • R Menaka + 2
Open Access
Cite
Save

Efficient Security for Data Communication in Wireless Sensor Networks using Raspberry PI

Information technology finds its wide application in many fields like healthcare, border security etc. where security of information is very important. With advancement in wireless sensor networks, gathering and processing of data have become much easier and affordable, due to its wide application, providing security to data is required. This work proposes a prototype that uses Raspberry Pi as secure sensor node that performs both regular encryption and XML encryption to provide security to the data collected by sensor nodes and transmit it to the master node in the WSN. The design uses a temperature sensor which can be replaced by any other sensor going forward and can be used in the field of healthcare, border security, and many other areas. The data are collected, processed, encrypted, and wirelessly communicated to the master node. Since there is direct interfacing between the sensor and Raspberry Pi, there is no risk of data loss. The idea of this paper is to meet the goal of comparing the two encryption techniques in terms of processing time and number of characters and to see which is better in terms of both the parameters.

Read full abstract
  • Journal of Network and Information Security
  • Jan 1, 2015
  • Shruti V Jadhav + 1
Cite
Save

On the insecurity of XML Security

Abstract XML Encryption and XML Signature describe how to apply encryption and signing algorithms to XML documents. These specifications are implemented in a wide range of systems and frameworks processing sensitive data, including banking, eGovernment, eCommerce, military, and eHealth infrastructures. The article presents practical and highly critical attacks which allow to forge signed XML documents or reveal contents of encrypted XML data.

Read full abstract
  • it - Information Technology
  • Nov 30, 2014
  • Juraj Somorovsky
Cite
Save

A Stream based Implementation of Secured SOA Model using XML Encryption and XML Signature

A Stream based Implementation of Secured SOA Model using XML Encryption and XML Signature

Read full abstract
  • International Journal of Computer Applications
  • Oct 18, 2014
  • Mallamma C G + 3
Open Access
Cite
Save

XML-structured data protection

The data structuring with the help of XML language are considered in this paper. The questions of such data protection will be considered besides, since the data representation in the form of xml document connected with certain limits and features. In this connection we will affect some of cryptography questions, algorithm CBC in particular, with reference to the XML Encryption technology. Information protection problems with this cryptography standard use will also considered.

Read full abstract
  • SPIIRAS Proceedings
  • Mar 17, 2014
  • Tatyana Vyacheslavovna Monakhova
Open Access
Cite
Save

Simple Encryption Research Based on Heterogeneous System

For the widespread application of XML technology in network, the security of XML documents is particularly outstanding. XML encryption technology can ensure the confidentiality and integrity of an XML document effectively, and provide important technical for the safety of the XML document transmission. This paper will first introduce the XML encryption technology and encryption standard, and three models of XML document encryption, and then the paper will give three simple implementation of the XML encryption document in the. NET Framework platform. It preliminary ensures the safety of XML document and shows the flexibility and simplicity of XML encryption technology.

Read full abstract
  • Applied Mechanics and Materials
  • Feb 1, 2014
  • Xing Wan
Cite
Save

Enhanced XML Encryption Using Classification Mining Technique for e-Banking Transactions

In this paper a novel approach is presented for securing financial Extensible Markup Language (XML) transactions using classification data mining (DM) algorithms. The authors' strategy defines the complete process of classifying XML transactions by using set of classification algorithms, classified XML documents processed at later stage using element-wise encryption. Classification algorithms were used to identify the XML transaction rules and factors in order to classify the message content fetching important elements within. The authors have implemented two classification algorithms to fetch the importance level value within each XML document. Classified content is processed using element-wise encryption for selected parts with “High” or “Medium” importance level values. Element-wise encryption is performed using AES symmetric encryption algorithm with different key sizes. An implementation has been conducted using data set fetched from e-banking service in one of the leading banks in Jordan to present system functionality and efficiency. Results from the authors' implementation presented an improvement in processing time encrypting XML documents.

Read full abstract
  • International Journal of Information Retrieval Research
  • Oct 1, 2013
  • Faisal T Ammari + 1
Cite
Save

An energy conservation indexing method for secure XML data broadcast in mobile wireless networks

Secure broadcasting of XML data is becoming an essential requirement for many applications in mobile wireless networks. Several indexing methods have been proposed to reduce the tuning time in processing the XML queries over the wireless XML stream. Tuning time is the sum of period of times which a mobile client stays in active mode in order to retrieve the required data over the wireless stream. Therefore, it is frequently used to estimate the energy consumption of a mobile client. The problem of existing indexing methods is that they cannot directly be applied to an encrypted XML stream since mobile clients can only access the authorized parts of the XML data in an encrypted XML stream. In this paper, we define a unit structure of an XML stream called SecNode which guarantees confidentiality of the XML data in the wireless stream. We also define two indexes called Min (NCS) and Min (NIS) for the SecNode structure based on the set of access authorizations specified in the original XML document in order to efficiently process the XML queries over the encrypted XML stream. Experimental results show that the use of the SecNode structure for secure XML data broadcast improves the performance of XML query processing in terms of tuning time and therefore reduces the power consumption at mobile clients.

Read full abstract
  • Pervasive and Mobile Computing
  • Sep 23, 2013
  • Leila Fathi + 2
Open Access
Cite
Save

Research on Encryption Method of the GML Spatial Data in Geographic Information Sharing System

This paper analyzed the typical architecture of geographic information sharing system based on GML spatial data, pointed out the security risks existed in the network transmission process of the GML spatial data and drawbacks of the existing security transport mechanisms in such a shared system. Further, the paper elaborates on advantages of encrypting the GML data using XML Encryption technology and the encryption process of the GML spatial data. On this basis, the paper gives an application example which encrypts all or part of spatial data in GML documents by the XML Encryption technology.

Read full abstract
  • Advanced Materials Research
  • Sep 1, 2013
  • Guang Shi Li
Cite
Save

Choosing Optimal Platform to Host Web Services with XML Signature and XML Encryption

Choosing Optimal Platform to Host Web Services with XML Signature and XML Encryption

Read full abstract
  • Journal of Next Generation Information Technology
  • Jul 31, 2013
  • Sasko Ristov + 1
Cite
Save

A Cross-Layer Security Scheme of Web-Services-Based Communications for IEEE 1451 Sensor and Actuator Networks

IEEE 1451 standard has been proposed to provide a common communication interface and transducer electric data sheet format for wired and wireless distributed applications in smart transducers (sensors and actuators). Currently, a unified Web service for IEEE 1451 smart transducers is a must. However, ensuring the security of web-services-based communications for IEEE 1451 smart transducers is an unsolved problem. In this paper, we proposed a cross-layer security mechanism that deals with the requirements of authentication, integrity, confidentiality, and availability across the communication process in IEEE 1451 smart transducers. The scheme contains three cross-layer components logically, including XML Encryption and Signature, SOAP Security Extension, and Web Services Description Language (WSDL) Security Checking. The former two components satisfy the requirements of confidentiality, availability, integrity, authentication, nonrepudiation, and freshness. The third component satisfies the requirement of availability, which can protect the system against denial-of-service (DoS) attack. The three cross-layer security components are integrated seamlessly in our scheme. To evaluate the overhead, we perform tests to evaluate the effect of message size on the performance of the access inquiry web service. The result supports the usefulness and feasibility of our scheme.

Read full abstract
  • International Journal of Distributed Sensor Networks
  • Mar 1, 2013
  • Jun Wu + 3
Open Access
Cite
Save

  • 1
  • 2
  • 3
  • 1
  • 2
  • 3

Popular topics

  • Latest Artificial Intelligence papers
  • Latest Nursing papers
  • Latest Psychology Research papers
  • Latest Sociology Research papers
  • Latest Business Research papers
  • Latest Marketing Research papers
  • Latest Social Research papers
  • Latest Education Research papers
  • Latest Accounting Research papers
  • Latest Mental Health papers
  • Latest Economics papers
  • Latest Education Research papers
  • Latest Climate Change Research papers
  • Latest Mathematics Research papers

Most cited papers

  • Most cited Artificial Intelligence papers
  • Most cited Nursing papers
  • Most cited Psychology Research papers
  • Most cited Sociology Research papers
  • Most cited Business Research papers
  • Most cited Marketing Research papers
  • Most cited Social Research papers
  • Most cited Education Research papers
  • Most cited Accounting Research papers
  • Most cited Mental Health papers
  • Most cited Economics papers
  • Most cited Education Research papers
  • Most cited Climate Change Research papers
  • Most cited Mathematics Research papers

Latest papers from journals

  • Scientific Reports latest papers
  • PLOS ONE latest papers
  • Journal of Clinical Oncology latest papers
  • Nature Communications latest papers
  • BMC Geriatrics latest papers
  • Science of The Total Environment latest papers
  • Medical Physics latest papers
  • Cureus latest papers
  • Cancer Research latest papers
  • Chemosphere latest papers
  • International Journal of Advanced Research in Science latest papers
  • Communication and Technology latest papers

Latest papers from institutions

  • Latest research from French National Centre for Scientific Research
  • Latest research from Chinese Academy of Sciences
  • Latest research from Harvard University
  • Latest research from University of Toronto
  • Latest research from University of Michigan
  • Latest research from University College London
  • Latest research from Stanford University
  • Latest research from The University of Tokyo
  • Latest research from Johns Hopkins University
  • Latest research from University of Washington
  • Latest research from University of Oxford
  • Latest research from University of Cambridge

Popular Collections

  • Research on Reduced Inequalities
  • Research on No Poverty
  • Research on Gender Equality
  • Research on Peace Justice & Strong Institutions
  • Research on Affordable & Clean Energy
  • Research on Quality Education
  • Research on Clean Water & Sanitation
  • Research on COVID-19
  • Research on Monkeypox
  • Research on Medical Specialties
  • Research on Climate Justice
Discovery logo
FacebookTwitterLinkedinInstagram

Download the FREE App

  • Play store Link
  • App store Link
  • Scan QR code to download FREE App

    Scan to download FREE App

  • Google PlayApp Store
FacebookTwitterTwitterInstagram
  • Universities & Institutions
  • Publishers
  • R Discovery PrimeNew
  • Ask R Discovery
  • Blog
  • Accessibility
  • Topics
  • Journals
  • Open Access Papers
  • Year-wise Publications
  • Recently published papers
  • Pre prints
  • Questions
  • FAQs
  • Contact us
Lead the way for us

Your insights are needed to transform us into a better research content provider for researchers.

Share your feedback here.

FacebookTwitterLinkedinInstagram

Copyright 2024 Cactus Communications. All rights reserved.

Privacy PolicyCookies PolicyTerms of UseCareers