Browse > Article

The Validity Verification of Encrypted XML Document using the XML Schema  

Hong, Seong-Pyo (조선대학교 대학원 컴퓨터공학과)
Lee, Joon (조선대학교 전자정보공과대학 컴퓨터공학부)
Abstract
XML has weakness problems on document modulation and elimination of data Because of the XML gives priority to present data format, XML signature, XML encryption, or XML access control is provided to overcome those weakness problems. However, structured XML efficiency contravention problem occurred from XML encryption and absence of protection from DID attack are still remains unsolved. In this paper, we suggests the XML schema that satisfies both validity and encryption. The DTD is unnecessary because XML schema supports Well-Formed XML documents and include meta information. Also XML schema has possibility to generate each XML document dynamically and because of self efficiency investigator rule, it has an advantage on extendability of DID based encryption of XML documents.
Keywords
Security; Digital Signature; XML Schema; XML Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Takeshi Imamura, Hiroshi Maruyama, 'Specification of Element-wise XML Encryption', W3C XML-Encryption Workshop, November, 2000
2 STI- SECURITY Technologies Inc, 'J/LOCK - Java Cryptography Package', March, 2000
3 Takeshi Imamura, Hiroshi Maruyama, 'Specification of Element - wise XML Encryption', W3C XML-Encryption Workshop, November, 2000
4 E. Bertino, M. Braun, S. Castano, E. Ferrari, M. Mesiti, 'Aurhor - x: a Java - Bas ed System for XML Data Protection', Proceeding of the 14th IFIP WG 11.3 Working Conference on Database Security, Schoorl. Netherlands, August, 2000
5 Jonathan Knudsen, 'Java Cryptography', O'REILLY, 1998
6 E. Damiani, S Vimercati, S. Paraboschi, P. Samarati, 'Design and Implementation of an Access Control Process or for XML Documents ', Proceedings of 9th International World Wide Web Conference, Amsterdam, May, 2000
7 Paul Brandt, Frederik Bonte, 'Towards Secure XML', http://lists.w3.org/Archives/publici xml-encryption/2000Oct/
8 H. Maruyama, K.Tamura, N. Uramoto, 'XML and Java, Developing Web Applications', Addison Wesley, May, 1999
9 William J. Pardi, 'XML in Action, Web Technology', Microsoft Press, 1999
10 Michiharu Kudo, Satoshi Hada, 'XML Document Security based on Provisional Authorization', Conference on Computer and Communication Society, Athens. Greece, November, 2000
11 Alpha, Works, 'XML Security Suite', 1999, htttp://www.alphaworks.ibm.com/tech/xml securitysuite