By Topic

XML based security for e-commerce applications

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
E. Xavier ; Dept. of Educ. & Res, Infosys Technol. Ltd., Tamil Nadu, India

The eXtensible Markup Language (XML) is widely seen as the successor to HTML. XML facilitates Internet B2B messaging owing to its simplicity and flexibility. XML's strength for e-commerce applications will be realized only when its inherent security weaknesses are identified and dislodged. XML was initially introduced as a data format for documents. Some applications need to block or allow access to entire XML instances, while others control access at the tag level. The control residing at the tag level is particularly important in the view of wider use of the XLink and XPointer standards, which enable applications to retrieve portions of documents. This paper discusses how security could be provided by XML documents based on authentication and encryption techniques using Document type Definition (DTDs) and digital signatures.

Published in:

Engineering of Computer Based Systems, 2001. ECBS 2001. Proceedings. Eighth Annual IEEE International Conference and Workshop on the

Date of Conference: