Provision of XML Security in E-Commerce Applications with XML Digital Signatures Using Virtual Smart Card

被引:1
|
作者
Ravi, Joannah [1 ]
Balusamy, Balamurugan [1 ]
机构
[1] Vellore Inst Technol, Sch Informat Technol & Engn, Vellore, Tamil Nadu, India
关键词
XML; Digital signatures; Virtual smart cards; Security; Cryptography; Information hiding; ATTACKS;
D O I
10.1007/978-3-319-30927-9_40
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper aims at enhancing XML security by generating an XML digital signature capable of providing the major security features such as authentication, integrity, non-repudiation and confidentiality [14]. It also extends the concept of Information hiding which overcomes the hidden problem of traditional XML digital signature generation called "MID-WAY READING". The security of the document is ensured by a process called 'information hiding'. The document to be sent is digitally signed as well as encrypted and thereby ensuring excellent security level during the business transactions in an e-commerce environment and in addition to that, the private key used for signing the document is stored in a virtual smart card that provides enhanced security.
引用
收藏
页码:411 / 421
页数:11
相关论文
共 50 条
  • [31] XML access control and e-commerce technologies for advanced information distribution
    Iwaihara, M
    Chatvichienchai, S
    Shiga, T
    Kambayashi, Y
    [J]. INTERNATIONAL CONFERENCE ON INFORMATICS RESEARCH FOR DEVELOPMENT OF KNOWLEDGE SOCIETY INFRASTRUCTURE, PROCEEDINGS, 2004, : 107 - 115
  • [32] Toward a dynamic e-commerce automation, with XML and workflow techniques on the grid
    Li, YH
    Cai, Q
    Li, YX
    [J]. PROCEEDINGS OF THE IEEE SOUTHEASTCON 2004: ENGINEERING CONNECTS, 2004, : 310 - +
  • [33] The Viewpoint of E-Commerce Security in the Digital Economy
    Priescu, Iustin
    Patriciu, Victor Valeriu
    Nicolaescu, Sebastian
    [J]. INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATIONS, PROCEEDINGS, 2009, : 431 - +
  • [34] Defending against XML-related attacks in e-commerce applications with predictive fuzzy associative rules
    Chan, Gaik-Yee
    Lee, Chien-Sing
    Heng, Swee-Huay
    [J]. APPLIED SOFT COMPUTING, 2014, 24 : 142 - 157
  • [35] Study of security issues in E-commerce applications
    Hanumesh, V.J.
    Sunder, K.S.
    [J]. IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India), 2000, 17 (04): : 209 - 214
  • [36] A study of security issues in E-commerce applications
    Hanumesh, VJ
    Sunder, KS
    [J]. IETE TECHNICAL REVIEW, 2000, 17 (04): : 209 - 214
  • [37] Antecedents of Security Pillars in E-Commerce Applications
    Shaqrah, Amin
    [J]. INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2011, 7 (01) : 36 - 51
  • [38] Directions for web and e-commerce applications security
    Thuraisingham, B
    Clifton, C
    Gupta, A
    Bertino, E
    Ferrari, E
    [J]. PROCEEDINGS OF THE TENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, 2001, : 200 - 204
  • [39] Case study: B2B e-commerce system specification and implementation employing Use-Case diagrams, digital signatures and XML
    Sheldon, FT
    Jerath, K
    Pilskalns, O
    Kwon, YJ
    Kim, WH
    Chung, H
    [J]. FOURTH INTERNATIONAL SYMPOSIUM ON MULTIMEDIA SOFTWARE ENGINEERING, PROCEEDINGS, 2002, : 106 - 113
  • [40] On the development of e-commerce data exchange technology from EDI, WEB and XML
    Zhang, B
    Zhang, L
    [J]. PROCEEDINGS OF THE 2001 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, VOLS I AND II, 2001, : 170 - 173