2008
DOI: 10.1016/j.jss.2007.12.763
|View full text |Cite
|
Sign up to set email alerts
|

XML security – A comparative literature review

Abstract: Since the turn of the millenium, Working Groups of the W3C have been concentrating on the development of XML based security standards, which are paraphrased as XML Security. XML Security consists of three recommendations: XML (Digital) Signature, XML Encryption and XML Key Management Specification (XKMS), all of them published by the W3C. By means of a review of the available literature the authors draw several conclusions about the status quo of XML Security. Furthermore the current state and focuses of resea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(7 citation statements)
references
References 34 publications
0
7
0
Order By: Relevance
“…However, the method in [7] is based on XACML which is an open standard; while ERM is built upon Microsofts generally proprietary Windows Rights Management Services (RMS) technology that works with RMS-enabled applications to help safeguard digital information from unauthorized use. In [3], the XML-based security standards will be used more and more in terms of an integrated security system, and the possible interaction of different standards was a basic goal in the evolution of XML-based security standards that include XACML and XML Security. The combined use of XACML, XML-ENC, and XML-DSIG in [7] is one more example of constructing an integrated security system focusing on secure, embedded, and fine-grained access control.…”
Section: Dep Of Information Science and Technologymentioning
confidence: 99%
“…However, the method in [7] is based on XACML which is an open standard; while ERM is built upon Microsofts generally proprietary Windows Rights Management Services (RMS) technology that works with RMS-enabled applications to help safeguard digital information from unauthorized use. In [3], the XML-based security standards will be used more and more in terms of an integrated security system, and the possible interaction of different standards was a basic goal in the evolution of XML-based security standards that include XACML and XML Security. The combined use of XACML, XML-ENC, and XML-DSIG in [7] is one more example of constructing an integrated security system focusing on secure, embedded, and fine-grained access control.…”
Section: Dep Of Information Science and Technologymentioning
confidence: 99%
“…As noted in [21], the XML-based security standards will be used more and more in terms of an integrated security system, and the possible interaction of different standards was a basic goal in the evolution of XML-based security standards. The framework's combined use of XACML, XML-ENC, XML-DSIG, and XKMS is one more example of constructing an integrated security system, with a focus on secure, embedded, and fine-grained access control.…”
Section: Related Workmentioning
confidence: 99%
“…The XML Security standards have been used with XACML for access control by integrated security systems for Web services [18]. As noted in [18], the XML-based security standards will be used more and more in terms of an integrated security system, and the possible interaction of different standards was a basic goal in the evolution of XML-based security standards that include XACML and XML Security.…”
Section: A Related Workmentioning
confidence: 99%
“…As noted in [18], the XML-based security standards will be used more and more in terms of an integrated security system, and the possible interaction of different standards was a basic goal in the evolution of XML-based security standards that include XACML and XML Security. Our combined use of XACML, XML-ENC and XML-DSIG is one more example of constructing an integrated security system, with our scheme focusing on secure, embedded, and fine-grained access control.…”
Section: A Related Workmentioning
confidence: 99%