6 XML Security
نویسندگان
چکیده
The extensible markup language (XML) is a markup language promoted by the World Wide Web consortium (W3C). XML overcomes the limitations of hypertext markup language (HTML) and represents an important opportunity to solve the problem of protecting information distributed on the Web, with the definition of access restrictions directly on the structure and content of the document. This chapter summarizes the key XML security technologies and provides an overview of how they fit together and with XML. It should serve as a roadmap for future research and basis for further exploration of relevant scientific literature and standard specifications.
منابع مشابه
The design and implementation of an application program interface for securing XML documents
The encryption and signature standards proposed by W3C specifying the format for encrypted XML documents are important advances towards XML security [Eastlake, Donald, Reagle, Joseph, Imamura, Takeshi, Dillaway, Blair, Simon, Ed, 2002. XML Encryption Syntax and Processing. W3C Recommendation 10 December 2002 , Eastlake, Donald, Reagle, Joseph, Solo, David, Bar...
متن کاملSecurity Based Heuristic SAX for XML Parsing
XML based services integrate information resources running on different platforms or technologies to enhance the service efficiency. Thus, the volume of XML traffic on networks is increasing rapidly, and it demands for efficient XML processing algorithms to support high performance services, especially in XML security applications. This paper proposes a memory efficient XML parsing algorithm le...
متن کاملXML-Based Security - A New Challenge to I.T. Protection
There has been a sudden rise in the use of XML and the development of tools and specifications using XML such as web services. Contemporary solutions were found to be lacking facilities to secure XML based applications. This paper is a review of XML security specifications. A comprehensive literature review was conducted to assess and summarize the validity of current and contemporary tools and...
متن کاملApplication of Criterion-Based Multilayer Access Control to XML Documents
An approach is proposed to address the finegrained multilayer access control requirements of XML files. The system is based on a set of predefined security criteria and security criterion expressions which serve as keys and locks respectively. The security criterion expressions are defined in the XML schema and embedded into individual XML files automatically. The XML files are enhanced to be s...
متن کاملSecurity Model for XML Data
The significance of XML technology for sharing data over the Internet is being rapidly recognised. In this paper, we examine the security problems related to XML data and present our approach, the XML Security model, for enforcing security policies in XML based Information systems. Our methodology has been based on the study of the XML data model, on the identification of the security requireme...
متن کامل