|Table of Contents|

[1] AL-Helali Adnan Hadi Mahdi**, Zhang Shensheng,. CIT/XML Security Platform Syntax and Processing* [J]. Journal of Southeast University (English Edition), 2002, 18 (2): 108-113. [doi:10.3969/j.issn.1003-7985.2002.02.002]
Copy

CIT/XML Security Platform Syntax and Processing*()
Share:

Journal of Southeast University (English Edition)[ISSN:1003-7985/CN:32-1325/N]

Volumn:
18
Issue:
2002 2
Page:
108-113
Research Field:
Computer Science and Engineering
Publishing date:
2002-06-30

Info

Title:
CIT/XML Security Platform Syntax and Processing*
Author(s):
AL-Helali Adnan Hadi Mahdi** Zhang Shensheng
Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200030, China
Keywords:
electronic commerce security digital certificates smart card digital commerce authentication SPKI XML
PACS:
TP309.7
DOI:
10.3969/j.issn.1003-7985.2002.02.002
Abstract:
Today companies and organizations are using the Web as the main information dissemination means both at internal and external level. Information dissemination often takes the form of XML documents that are made available at Web servers, or that are actively broadcasted by Web servers to interested clients. These documents often contain information at different degrees of sensitivity, therefore a strong XML security platform and mechanism is needed. In this paper we developed CIT/XML security platform and take a close look to syntax and processing of CIT/digital signature model, CIT/encryption model, CIT/ smart card crypto and SPKI interface security models. Security services such as authentication, integrity and confidentiality to XML documents and non-XML documents, which exchanged among various servers, are provided.

References:

[1] Bertino E, Castano S, Ferrari E. On specifying security policies for Web documents with an XML-based, language [J]. ACM Symposium on Access Control Models and Technologies, Fairfax, VA, May 2001.
[2] W3C. XML 1.0 Recommendation[EB/OL]. http://www.w3.org/TR/1998/REC-xml-19980210, February 1998.
[3] W3C. XML-Signature Syntax and Processing[EB/OL]. http://www.w3.org/TR/2001/, August 2001.
[4] Frank Boumphrey. Professional XML applications [M]. WROX, 1999.
[5] Elisa bertino, Barbara carminat. XML security [EB/OL]. Report http://www.elsevier.com, 2001.
[6] Dr. Shimshon Berkovits. Public key infrastructure study [EB/OL]. Final Report, 1994.
[7] Rivest R L, Shamir A, Adleman L M. A method for obtaining digital signatures and public-key cryptosystems [J]. Communications of the ACM, 1978.
[8] ElGamal T. A public-key cryptosystem and a signature scheme based on discrete [J]. Communications of the ACM, April 1985.
[9] Microsoft. SDK cryptography, smart card cryptography[EB/OL]. http://www.micosoft.com. August 1999.
[10] Schneier B. Applied cryptography [M]. Wiley, 1996.

Memo

Memo:
* The project supported by the National Natural Science Foundation of China(59789502)and 863 High-Tech R&D program(863-511-030-006).
** Born in 1961, male, graduate.
Last Update: 2002-06-20