Integrity verification for XML data
نویسندگان
چکیده
The success of the Internet has made the communication very easy between parties and XML is one of the most used standard for information representation and exchange. A huge amount of data is crossing the Internet on the daily basis. Since the Internet is an unreliable network, XML data can be easily captured and tampered by unauthorized users. This study is proposing a scheme that uses fragile watermarking to detect and localize any modification made to an XML data. This scheme is distortion free since it doesn’t introduce any distortion to the XML data. This scheme uses an algorithm that distributes elements of the XML data into groups in a secure manner according to certain parameters. The watermark is verified without the need to have the initial XML data, and also, the embedding and the verification process in each group are independent. Experimental results and security analysis show that the chance to detect and locate change in the XML data
منابع مشابه
Trustworthy Verification and Visualisation of Multiple XML-Signatures
The digital signature is one of the most important cryptographic primitives. It provides data integrity, message authentication and non-repudiation, which are required attributes in security critical services, such as electronic commerce, voting or health care. Whereas previous data formats for digital signatures concentrated on signing the entire document, the XML signature standard is feasibl...
متن کاملObject-Oriented Constraints for XML Schema
This paper presents an object-oriented representation of the core structural and constraint-related features of XML Schema. The structural features are represented within the limitations of object-oriented type systems including particles (elements and groups) and type hierarchies (simple and complex types and type derivations). The applicability of the developed representation is demonstrated ...
متن کاملWhen Grammars do not Suffice: Data and Content Integrity Constraints Verification in XML through a Conceptual Model
Complex applications can benefit greatly from using conceptual models and Model Driven Architecture during development, deployment and runtime. XML applications are not different. In this paper, we examine the possibility of using Object Constraint Language (OCL) for expressing constraints over a conceptual model for XML data. We go through the different classes of OCL expression and show how e...
متن کاملConfiguration Tool for ARINC 653 Operating Systems
ARINC 653 Specification defines a standardized interface of real-time operating systems and an Application Executive (APEX) to develop the reliable applications for avionics based on Integrated Modular Avionics (IMA). The requirements of system platform based on ARINC 653 Standard are defined as configuration data and are integrated to the XML configuration file(s) in the real-time operating sy...
متن کاملAn Interactive Tool Based on Xml Technology for Data Exchange between Heterogeneous Erp Systems
Data exchange between enterprise resource planning (ERP) systems in a supply chain system needs to fulfill requirements of both schema integration and message translation. Since ERP systems with relational database systems are developed independently, schema conflicts between databases is a common problem for schema integration. Thus, supply chain partners need to preserve the data integrity of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007