Selective and Authentic Third Part Distribution of XML Documents
#1

Selective and Authentic Third Part Distribution of XML Documents (Java)
IEEE Transactions on Knowledge and Data Engineering, Vol. 16, No. 10,

Abstract:
Third-party architectures for data publishing over the Internet today are receiving growing attention, due to their scalability properties and to the ability of efficiently managing large number of subjects and great amount of data. In a third-party architecture, there is a distinction between the Owner and the Publisher of information. The Owner is the producer of information, whereas Publishers are responsible for managing (a portion of) the Owner information and for answering subject queries. A relevant issue in this architecture is how the Owner can ensure a secure and selective publishing of its data, even if the data are managed by a third-party, which can prune some of the nodes of the original document on the basis of subject queries and access control policies. An approach can be that of requiring the Publisher to be trusted with regard to the considered security properties. However, the serious drawback of this solution is that large Web-based systems cannot be easily verified to be secure and can be easily penetrated. For these reasons, in this paper, we propose an alternative approach, based on the use of digital signature techniques, which does not require the Publisher to be trusted. The security properties we consider are authenticity and completeness of a query response, where completeness is intended with regard to the access control policies stated by the information Owner. In particular, we show that, by embedding in the query response one digital signature generated by the Owner and some hash values, a subject is able to locally verify the authenticity of a query response. Moreover, we present an approach that, for a wide range of queries, allows a subject to verify the completeness of query results.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: results pk ssc part 2, athlone it part time, mdsu ba part 2, authentic shoes, part time accounting course, third, part time jobs for teachers,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,068 15-02-2017, 03:40 PM
Last Post: jaseela123d
  Packet-Hiding Methods for Preventing Selective Jamming Attacks 1 688 14-02-2017, 11:35 AM
Last Post: ijasti
  Packet-Hiding Methods for Preventing Selective Jamming Attacks Projects9 5 4,375 30-07-2013, 05:30 PM
Last Post: mounikabujji
  Automation of Airtel prepaid distribution Accounts Management mechanical engineering crazy 3 3,880 07-05-2013, 10:11 AM
Last Post: computer topic
  application projects in java and vb.net (titles and topics) project topics 1 5,497 28-11-2012, 01:11 PM
Last Post: seminar details
  PREVENTION OF SQL INJECTION AND DATA THEFTS USING DIVIDE AND CONQUER APPROACH seminar presentation 3 4,188 24-10-2012, 01:09 PM
Last Post: seminar details
  Design and Analysis of the Gateway Relocation and Admission Control Algorithm in Mobi Projects9 1 1,721 10-10-2012, 12:22 PM
Last Post: seminar details
  Mitigating Selective Forwarding Attacks With A Channel-Aware Approach In Wmns project topics 3 2,019 02-03-2012, 11:05 AM
Last Post: seminar paper
  HARDWARE ENHANCED ASSOCIATION RULE MINING WITH HASHING AND PIPELINING - KNOWLEDGE AND electronics seminars 3 3,906 20-02-2012, 04:33 PM
Last Post: seminar paper
  Emerging JAVA and .NET Technology And Critical Trends seminar class 1 2,288 11-02-2012, 12:07 PM
Last Post: seminar addict

Forum Jump: