๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Secure XML: The New Syntax for Signatures and Encryption

โœ Scribed by Donald E. Eastlake, Kitty Niles


Book ID
127434767
Publisher
Pearson Education
Year
2002
Tongue
English
Weight
1 MB
Edition
1st
Category
Library
ISBN
0201756056

No coin nor oath required. For personal study only.

โœฆ Synopsis


Extensible Markup Language (XML) is the environment of choice for creating many of today's technologically sophisticated and security-sensitive Web applications. With Secure XML, developers now have the hands-on guide they need to combine a strong foundation in XML with proven, practical techniques for enabling the secure transmission of data across the Web.Broad-based and comprehensive, Secure XML fully documents every feature and issue involved with XML security. Opening with a complete introduction to XML, the book then provides detailed coverage of authentication, canonicalization, keying, encryption, algorithms, and more. Notes, background information, guidelines, and "soapbox," or heretical comments, expand on the book's practical focus throughout. In all, this book features the most comprehensive roadmap to digital security and XML encryption available.Topics covered in-depth include:XML basics-documents, namespaces, structures, DTDs and schemas, and stylesheets XPath, XPointer, and SOAP Digital cryptography basics - secret and public key ciphers, asymmetric keys, digital signatures, and certificates XML canonicalization, signatures, and authentication XML encryptionKey management and combining encryption with signatures Cryptographic algorithms and noncryptographic algorithmsDetailed and practical, this book provides reliable solutions for securing XML and for safeguarding information flow across today's sophisticated Web.


๐Ÿ“œ SIMILAR VOLUMES


Securing Web Services with WS-Security:
โœ Jothy Rosenberg, David Remy ๐Ÿ“‚ Library ๐Ÿ“… 2004 ๐Ÿ› Sams ๐ŸŒ English โš– 4 MB

You know how to build Web service applications using XML, SOAP, and WSDL, but can you ensure that those applications are secure? Standards development groups such as OASIS and W3C have released several specifications designed to provide security - but how do you combine them in working applications?

New Efficient and Secure Protocols for V
โœ Dario Catalano; Rosario Gennaro ๐Ÿ“‚ Article ๐Ÿ“… 2000 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 503 KB

V S enables the recipient of a digital signature, who is not necessarily the original signer, to share that signature among n proxies so that a subset of them can later reconstruct it. Efficient protocols were also given for RSA, Rabin, ElGamal, Schnorr, and DSS signatures. However, their RSA and Ra