A Smart XML Access Right Controller for Mobile Applications
نویسندگان
چکیده
Chip-Secured XML Access (C-SXA) is a versatile XML-based Access Right Controller embedded in a smart card. C-SXA can be used either to protect the privacy of on-board personal data or to control the flow of data extracted from an external source. C-SXA addresses a broad range of applications, like secure portable folders, Digital Right Management, parental control or exchange of confidential information among a community of users. We illustrate the effectiveness of this technology through a collaborative agenda application embedded in a cellular phone SIM card.
منابع مشابه
Prototyping a Vibrato-Aware Query-By-Humming (QBH) Music Information Retrieval System for Mobile Communication Devices: Case of Chromatic Harmonica
Background and Aim: The current research aims at prototyping query-by-humming music information retrieval systems for smart phones. Methods: This multi-method research follows simulation technique from mixed models of the operations research methodology, and the documentary research method, simultaneously. Two chromatic harmonica albums comprised the research population. To achieve the purpose ...
متن کاملTamper-resistant ubiquitous data management
The rapid growth of ubiquitous computing impels mobile users to store personal data on the Web in order to increase data availability and facilitate data sharing among partners. However, Database Service Providers (DSP) arouse user’s suspicion because DSP’s privacy policies have been frequently dishonored [AKS02]. In addition, no one can fully trust traditional server-based security mechanisms ...
متن کاملTamper-resistent ubiquitous data management
Chip-Secured XML Access (C-SXA) is a versatile and tamper-resistant XML-based Access Right Controller embedded in a smart card. C-SXA can be used either to protect the privacy of onboard personal data or to control the flow of data extracted from an external source. Tamperresistance is inherited from the smart card for on-board data or achieved using cryptographic techniques for external data. ...
متن کاملSécurisation du contrôle d'accès pour des documents XML. (A Secure Access Controller for XML Documents)
The erosion of trust put in traditional database servers and in Database ServiceProviders and the growing interest for different forms of selective data dissemination aredifferent factors that lead to move the access control from servers to clients. Different dataencryption and key dissemination schemes have been proposed to serve this purpose. Bycompiling the access control rul...
متن کاملOrganizing XML Data in a Wireless Broadcast System by Exploiting Structural Similarity
Wireless data broadcast is an efficient way of delivering data of common interest to a large population of mobile devices within a proximate area, such as smart cities, battle fields, etc. In this work, we focus ourselves on studying the data placement problem of periodic XML data broadcast in mobile and wireless environments. This is an important issue, particularly when XML becomes prevalent ...
متن کامل