Implementation an XML Multi-Signature Scheme for XML Data Authentication

Article Preview

Abstract:

XML signature is used to ensure XML data authentication. An XML multi-signature should satisfy multiple data authentication requirements for XML data which passes a hierarchical network of different responsibilities. Based on presented series-parallel XML multi-signature scheme, the implementation of a series-parallel XML multi-signature scheme is illustrated. The paper describes the algorithm for possible XPath in DTD, algorithm for series-parallel graph converting to sub-signing group, and the presentation for signed results.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

236-240

Citation:

Online since:

June 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] E. Bertino, XML security. Information security technical report, Vol. 6 No. 2, (2001) pp.44-58.

DOI: 10.1016/s1363-4127(01)00206-0

Google Scholar

[2] E. Damiani, S. De, C. Di, P. Samarati, Towards securing XML web services. ACM workshop on XML security, November 22, USA, (2002) pp.90-96.

DOI: 10.1145/764792.764806

Google Scholar

[3] D. J. Polivy, R. Tamassia, Authenticating distributed data using Web services and XML signatures. In: proceedings of the 2002 ACM workshop on XML security, (2002) pp.80-89.

DOI: 10.1145/764792.764805

Google Scholar

[4] K.R.P.H. Leung, L.C.K. Hui, Handling signature purposes in workflow systems. The Journal of System and Software, 55 (2001) pp.245-259.

DOI: 10.1016/s0164-1212(00)00074-1

Google Scholar

[5] B. Liu, J. Lu, J. Yip, A Series-parallel XML Multisignature Scheme for XML Data Authentication, International Journal of Computer Science and Network Security, VOL. 9 No. 2, (2009) pp.236-247.

Google Scholar

[6] M. Bartel, J. Boyer, B. Fox, B. LaMacchia, E. Simon, XML signature syntax and processing (second edition), Available at: http: /www. w3. org/TR/xmldsig-core/ (Accessed on 6 December 2008).

Google Scholar

[7] T-C. Wu, C-C. Huang, D.J. Guan, Delegated multisignature scheme with document decomposition. The Journal of Systems and Software, 55 (2001) pp.321-328.

DOI: 10.1016/s0164-1212(00)00080-7

Google Scholar

[8] E. J-L. Lu, R-F. Chen, An XML multisignature scheme. Applied Mathematics and Computation, 149 (2004) pp.1-14.

DOI: 10.1016/s0096-3003(02)00944-x

Google Scholar

[9] K. Wolfgang, G. Sebastian, P. Michael and S. Jorg, Trustworthy Verification and Visualisation of Multiple XML-Signatures. In: proceedings of the 19th IFIP TC-11 Conference on Communications and Multimedia Security (CMS2005), LNCS 3677, (2005).

Google Scholar