Understanding XML security with a case study

Joan Lu, Nathan Cripps

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This research aims at obtaining a solution in modelling an XML based security system for heterogeneous scientific data/documents. A set of XML security technologies, such as XML signature & encryption, are deployed into the investigation. Such a flexible framework can be achieved for representing digital signatures, especially for electronic certificates that need to be signed, authorised and stored in a content management system.

Original languageEnglish
Title of host publicationProceedings of the 2008 International Conference on Internet Computing, ICOMP 2008
EditorsHamid R. Arabnia, Victor A. Clincy
PublisherCSREA Press
Pages291-297
Number of pages7
ISBN (Print)1601320736, 9781601320735
Publication statusPublished - 1 Dec 2008
Event2008 International Conference on Internet Computing - Las Vegas, United States
Duration: 14 Jul 200817 Jul 2008

Conference

Conference2008 International Conference on Internet Computing
Abbreviated titleICOMP 2008
CountryUnited States
CityLas Vegas
Period14/07/0817/07/08

Fingerprint

XML
Electronic document identification systems
Security systems
Cryptography

Cite this

Lu, J., & Cripps, N. (2008). Understanding XML security with a case study. In H. R. Arabnia, & V. A. Clincy (Eds.), Proceedings of the 2008 International Conference on Internet Computing, ICOMP 2008 (pp. 291-297). CSREA Press.
Lu, Joan ; Cripps, Nathan. / Understanding XML security with a case study. Proceedings of the 2008 International Conference on Internet Computing, ICOMP 2008. editor / Hamid R. Arabnia ; Victor A. Clincy. CSREA Press, 2008. pp. 291-297
@inproceedings{4ea932f3c38345b7bc0fcc691cd49370,
title = "Understanding XML security with a case study",
abstract = "This research aims at obtaining a solution in modelling an XML based security system for heterogeneous scientific data/documents. A set of XML security technologies, such as XML signature & encryption, are deployed into the investigation. Such a flexible framework can be achieved for representing digital signatures, especially for electronic certificates that need to be signed, authorised and stored in a content management system.",
keywords = "Object oriented technology, XML encryption, XML security, XML signature",
author = "Joan Lu and Nathan Cripps",
year = "2008",
month = "12",
day = "1",
language = "English",
isbn = "1601320736",
pages = "291--297",
editor = "Arabnia, {Hamid R.} and Clincy, {Victor A.}",
booktitle = "Proceedings of the 2008 International Conference on Internet Computing, ICOMP 2008",
publisher = "CSREA Press",

}

Lu, J & Cripps, N 2008, Understanding XML security with a case study. in HR Arabnia & VA Clincy (eds), Proceedings of the 2008 International Conference on Internet Computing, ICOMP 2008. CSREA Press, pp. 291-297, 2008 International Conference on Internet Computing, Las Vegas, United States, 14/07/08.

Understanding XML security with a case study. / Lu, Joan; Cripps, Nathan.

Proceedings of the 2008 International Conference on Internet Computing, ICOMP 2008. ed. / Hamid R. Arabnia; Victor A. Clincy. CSREA Press, 2008. p. 291-297.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Understanding XML security with a case study

AU - Lu, Joan

AU - Cripps, Nathan

PY - 2008/12/1

Y1 - 2008/12/1

N2 - This research aims at obtaining a solution in modelling an XML based security system for heterogeneous scientific data/documents. A set of XML security technologies, such as XML signature & encryption, are deployed into the investigation. Such a flexible framework can be achieved for representing digital signatures, especially for electronic certificates that need to be signed, authorised and stored in a content management system.

AB - This research aims at obtaining a solution in modelling an XML based security system for heterogeneous scientific data/documents. A set of XML security technologies, such as XML signature & encryption, are deployed into the investigation. Such a flexible framework can be achieved for representing digital signatures, especially for electronic certificates that need to be signed, authorised and stored in a content management system.

KW - Object oriented technology

KW - XML encryption

KW - XML security

KW - XML signature

UR - http://www.scopus.com/inward/record.url?scp=62749130807&partnerID=8YFLogxK

UR - https://dblp.org/db/conf/ic/icomp2008

M3 - Conference contribution

AN - SCOPUS:62749130807

SN - 1601320736

SN - 9781601320735

SP - 291

EP - 297

BT - Proceedings of the 2008 International Conference on Internet Computing, ICOMP 2008

A2 - Arabnia, Hamid R.

A2 - Clincy, Victor A.

PB - CSREA Press

ER -

Lu J, Cripps N. Understanding XML security with a case study. In Arabnia HR, Clincy VA, editors, Proceedings of the 2008 International Conference on Internet Computing, ICOMP 2008. CSREA Press. 2008. p. 291-297