|
|
The Characteristic and Application Mode of XML Encryption |
Qi Aihua Liu Youhua Liu Yusong |
(Department of Information Management, Nanjing University , Nanjing 210093, China) |
|
|
Abstract As the broad application of XML, the security of XML data shouldn’t be ignoranced. XML encryption technology is one of the important technologies of XML security. This article introduced the common XML encryption theory, discussed the method of exchanging the secret keys, the mode of implementation, and introduced the approach of dealing with XML encryption granularity.
|
Received: 31 December 2004
Published: 25 May 2005
|
|
Corresponding Authors:
Qi Aihua
E-mail: qiah1120@126.com
|
About author:: Qi Aihua,Liu Youhua,Liu Yusong |
1Bilal Siddiqui. Demonstrating the secure exchange of structured data. http://www-900.cn.ibm.com/developerWorks/cn/xml/x-encrypt/index_eng.shtml,2002,5 (Accessed Jul.27,2004)
2Takeshi Imamura, Blair Dillaway , Ed Simon . XML Encryption Syntax and Processing. http://www.w3.org/TR/xmlenc-core/ (Accessed Aug.15,2004)
3Manish Verma.XML Security:Implement security layers, Part 2.http://www-900.cn.ibm.com/developerWorks/cn/xml/x-seclay2/index_eng.shtml(Accessed Oct.8,2004)
4郭路. XML在传统制造业B2B供应链中的应用.http://www-900.cn.ibm.com/developerWorks/cn/xml/xmlb2b/index5.shtml ,2001,6(Accessed Oct.29,2004)
5Manish Verma. Basic plumbing technologies.http://www-900.cn.ibm.com/developerWorks/cn/xml/x-seclay1/index_eng.shtml(Accessed Sep.12,2004)
6Mark Bartel, John Boyer, Barb Fox, Brian LaMacchia, Ed Simon. XML-Signature Syntax and Processing.http://www.w3.org/TR/xmldsig-core/ (Accessed Aug.24,2004) |
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|