CRYPTO '89 Proceedings on Advances in cryptology
Algorithms on strings, trees, and sequences: computer science and computational biology
Algorithms on strings, trees, and sequences: computer science and computational biology
Regular path queries with constraints
PODS '97 Proceedings of the sixteenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
Data on the Web: from relations to semistructured data and XML
Data on the Web: from relations to semistructured data and XML
Comparative analysis of five XML query languages
ACM SIGMOD Record
Accountable certificate management using undeniable attestations
Proceedings of the 7th ACM conference on Computer and communications security
Comparative analysis of six XML schema languages
ACM SIGMOD Record
XML Access Control Systems: A Component-Based Approach
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Authentic Third-party Data Publication
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Certificate revocation and certificate update
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
A fine-grained access control system for XML documents
ACM Transactions on Information and System Security (TISSEC)
Authenticating distributed data using Web services and XML signatures
Proceedings of the 2002 ACM workshop on XML security
Content extraction signatures using XML digital signatures and custom transforms on-demand
WWW '03 Proceedings of the 12th international conference on World Wide Web
Certifying data from multiple sources [Extended Abstract]
Proceedings of the 4th ACM conference on Electronic commerce
Authentic data publication over the internet
Journal of Computer Security - IFIP 2000
A flexible and scalable authentication scheme for JPEG2000 image codestreams
MULTIMEDIA '03 Proceedings of the eleventh ACM international conference on Multimedia
Authenticating Query Results in Edge Computing
ICDE '04 Proceedings of the 20th International Conference on Data Engineering
Succinct specifications of portable document access policies
Proceedings of the ninth ACM symposium on Access control models and technologies
Selective and Authentic Third-Party Distribution of XML Documents
IEEE Transactions on Knowledge and Data Engineering
Provable bounds for portable and flexible privacy-preserving access
Proceedings of the tenth ACM symposium on Access control models and technologies
Securing XML data in third-party distribution systems
Proceedings of the 14th ACM international conference on Information and knowledge management
Ontology guided XML security engine
Journal of Intelligent Information Systems - Special issue: Database and applications security
Succinct representation of flexible and privacy-preserving access rights
The VLDB Journal — The International Journal on Very Large Data Bases
Three architectures for trusted data dissemination in edge computing
Data & Knowledge Engineering - Special issue: ER 2004
Secure data replication over untrusted hosts
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Dynamic access-control policies on XML encrypted data
ACM Transactions on Information and System Security (TISSEC)
Tamper detection in audit logs
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Ensuring correctness over untrusted private database
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Efficient Content Authentication in Peer-to-Peer Networks
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Access Control for XML Document
IEA/AIE '08 Proceedings of the 21st international conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems: New Frontiers in Applied Artificial Intelligence
Structural signatures for tree data structures
Proceedings of the VLDB Endowment
Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Authenticated dictionaries for fresh attribute credentials
iTrust'03 Proceedings of the 1st international conference on Trust management
Grouping verifiable content for selective disclosure
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Fractal Merkle tree representation and traversal
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Implementing a tamper-evident database system
ASIAN'05 Proceedings of the 10th Asian Computing Science conference on Advances in computer science: data management on the web
Indexing information for data forensics
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Verified query results from hybrid authentication trees
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Authenticating query results in data publishing
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Efficient verification of web-content searching through authenticated web crawlers
Proceedings of the VLDB Endowment
Validating web content with senser
Proceedings of the 29th Annual Computer Security Applications Conference
Hi-index | 0.00 |
XML is increasingly becoming the format of choice for information exchange, in critical areas such as government, finance, healthcare and law, where integrity is of the essence. As this trend grows, one can expect that documents (or collections thereof) may get quite large, and clients may wish to query for specific segments of these documents. In critical applications, clients must be assured that they are getting complete and correct answers to their queries. Existing methods for signing XML documents cannot be used to establish that an answer to a query is complete. A simple approach has a server processing queries and certifying answers by digitally signing them with an on-line private key; however, the server, and its on-line private key, would be vulnerable to external hacking and insider attacks. We propose a new approach to signing XML documents which allows untrusted servers to answer certain types of path queries and selection queries over XML documents without the need for trusted on-line signing keys. This approach enhances both the security and scalability of publishing information in XML format over the internet. In addition, it provides greater flexibility in authenticating parts of XML documents, in response to commercial or security policy considerations.