Research on XML Data Structural-Integrity in XML Signature

Article Preview

Abstract:

With the extensive application of XML, especially in e-commerce field, XML data security has become the focus of people, which particularly shows in its structural attack specific to the location relation to elements in tree structure. Combined with the characteristics of tree structure of XML data as well as the basic features of traversing binary tree, the paper proposes a method to protect the structural-integrity of XML digital signature, so as to protect XML data element from structural attack through the basic features of traversing binary tree, and ensure the absolute location relationship among elements.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1844-1848

Citation:

Online since:

January 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Gruschka, N., and Iacono, L., Vulnerable Cloud: SOAP Message Security Validation Revisited. Proceedings of the IEEE international Conference on Web Services. ICWS'09, Los Angeles, USA. pp.625-631.

DOI: 10.1109/icws.2009.70

Google Scholar

[2] Somorovsky, J., Heiderich, M., Gruschka, N., and Iacono, L., All Your Clouds are Belong to us-Security Analysis of Cloud Management Interfaces. Proceedings of the 3rd ACM workshop on Cloud computing security workshop. CCSW'11, October, 2011, Chicago, USA. pp.3-14.

DOI: 10.1145/2046660.2046664

Google Scholar

[3] Gruschka, N., and Jensen, M., Attack Surfaces: A Taxonomy for Attacks on Cloud Services. 2010 IEEE 3rd International Conference on Cloud Computing. pp.276-279.

DOI: 10.1109/cloud.2010.23

Google Scholar

[4] Jansen, W. A., Cloud Hooks: Security and privacy Issues in Cloud Computing. Proceedings of 44th Hawaii International Conference on System Sciences, 2011. pp.1-10.

DOI: 10.1109/hicss.2011.103

Google Scholar

[5] Jensen, M., Schwenk, J., Gruschka, N., and Iacono, L. I., On Technical Security Issues in Cloud Computing. 2009 IEEE International Conference on Cloud Computing. pp.109-116.

DOI: 10.1109/cloud.2009.60

Google Scholar

[6] Kadam, Y., Security Issues in Cloud Computing: A Transparent View. International Journal of Computer Science & Emerging Technologies, Vol. 2 No. 5, 2011. pp.316-322.

Google Scholar