How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Collaborative proxy system for distributed Web content transcoding
Proceedings of the ninth international conference on Information and knowledge management
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Role-based access control on the web
ACM Transactions on Information and System Security (TISSEC)
A uniform framework for regulating service access and information release on the web
Journal of Computer Security
IEEE Transactions on Knowledge and Data Engineering
On the Optimal Placement of Web Proxies in the Internet: The Linear Topology
HPN '98 Proceedings of the IFIP TC-6 Eigth International Conference on High Performance Networking
Authentic Third-party Data Publication
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Authenticating distributed data using Web services and XML signatures
Proceedings of the 2002 ACM workshop on XML security
Modeling service-based multimedia content adaptation in pervasive computing
Proceedings of the 1st conference on Computing frontiers
Replication for web hosting systems
ACM Computing Surveys (CSUR)
Replication for web hosting systems
ACM Computing Surveys (CSUR)
Flexible authentication of XML documents
Journal of Computer Security - Special issue on ACM conference on computer and communications security, 2001
A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming
IEEE Transactions on Knowledge and Data Engineering
An approach to cooperative updates of XML documents in distributed systems
Journal of Computer Security
Point-based trust: define how much privacy is worth
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Automatic proxy-based watermarking for WWW
Computer Communications
Tapestry: a resilient global-scale overlay for service deployment
IEEE Journal on Selected Areas in Communications
CDNsim: A simulation tool for content distribution networks
ACM Transactions on Modeling and Computer Simulation (TOMACS)
Integrity assurance for RESTful XML
ER'10 Proceedings of the 2010 international conference on Advances in conceptual modeling: applications and challenges
Towards end-to-end secure content storage and delivery with public cloud
Proceedings of the second ACM conference on Data and Application Security and Privacy
Hi-index | 0.00 |
The fast development of web services, or more broadly, service-oriented architectures (SOAs), has prompted more organizations to move contents and applications out to the Web. Softwares on the web allow one to enjoy a variety of services, for example translating texts into other languages and converting a document from one format to another. In this paper, we address the problem of maintaining data integrity and confidentiality in web content delivery when dynamic content modifications are needed. We propose a flexible and scalable model for secure content delivery based on the use of roles and role certificates to manage web intermediaries. The proxies coordinate themselves in order to process and deliver contents, and the integrity of the delivered content is enforced using a decentralized strategy. To achieve this, we utilize a distributed role lookup table and a role-number based routing mechanism. We give an efficient secure protocol, iDeliver, for content processing and delivery, and also describe a method for securely updating role lookup tables. Our solution also applies to the security problem in web-based workflows, for example maintaining the data integrity in automated trading, contract authorization, and supply chain management in large organizations.