Protection and administration of XML data sources
Data & Knowledge Engineering - Data and applications security
Defective Sign & Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML
Proceedings of the General Track: 2002 USENIX Annual Technical Conference
New client puzzle outsourcing techniques for DoS resistance
Proceedings of the 11th ACM conference on Computer and communications security
Security Conscious Web Service Composition
ICWS '06 Proceedings of the IEEE International Conference on Web Services
XML access control using static analysis
ACM Transactions on Information and System Security (TISSEC)
Using client puzzles to protect TLS
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Security analysis of cryptographically controlled access to XML documents
Journal of the ACM (JACM)
XML security - A comparative literature review
Journal of Systems and Software
Security standards for the semantic web
Computer Standards & Interfaces
On the Relationship Between Web Services Security and Traditional Protocols
Electronic Notes in Theoretical Computer Science (ENTCS)
Secure web forms with client-side signatures
ICWE'05 Proceedings of the 5th international conference on Web Engineering
Hi-index | 0.00 |
In parallel to rapid growth of internet technologies, security becomes more critical in various real life applications such as e-finance, e-health, and e-government. These applications strictly require data authentication mechanisms. To address this essential issue, we grasp the idea of client based authenticity for interactive web technologies. We proposed a novel client based web form signing and checking with XML data structure method. Our method specifically uses XML structure for the involvement of data exchange between web applications. Our method curbs the DoS (Denial of Service) attacks for protection of the server. In order to illustrate our ideas, we adapted our digital signature mechanism on health related forms with two commonly used web browsers.