2006
DOI: 10.1007/11751649_27
|View full text |Cite
|
Sign up to set email alerts
|

XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2008
2008
2014
2014

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…XML Encryption is one of their leading security standards to provide the required data confidentiality by encrypting selected parts or the entire document. Flexibility of selecting specific parts of the document to be encrypted gives us the advantage to select which parts to be processed saving time and resources, However, some publications included criticism focusing on performance and representation issues [12,13] which will be discussed in literature review section…”
Section: Xml Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…XML Encryption is one of their leading security standards to provide the required data confidentiality by encrypting selected parts or the entire document. Flexibility of selecting specific parts of the document to be encrypted gives us the advantage to select which parts to be processed saving time and resources, However, some publications included criticism focusing on performance and representation issues [12,13] which will be discussed in literature review section…”
Section: Xml Securitymentioning
confidence: 99%
“…Models tend to protect XML messages in a proper way ensuring data confidentiality and authenticity, but due to the variations of XML threats [19] XML parser by sending mass amount of data To cover all mentioned threats it was challenging for proposed security models, however it can be achieved by XML Encryption [3] which can secure the whole XML document or parts within the XML message covering sensitive information from being exposed to achieve data confidentiality. Some publications showed a performance issues [13], presentation problem [21], and use of canonicalization [20] "Continue"…”
Section: Literature Reviewmentioning
confidence: 99%
“…But not only the signature is affected by this problem, also XML Encryption suffers in the same way from the use of Canonicalization (Imamura, Clark & Maruyama 2002, Yang, Ng, Lau & Cheng 2006. (Park, Kim, Chung, Sohn & Won 2006) on the other hand refers the performance problem to the self descriptive structure of XML itself. Due to the inefficient representation of the data, XML based messages are larger and need more operating time than existing protocols as RMI, RMI/IIOP or CORBA/IIOP.…”
Section: Observation 1: Bad Performance and Memory Inefficiency Of Xmmentioning
confidence: 99%
“…Apart from this general work on improvement of the performance, other application-specific ideas could be found. (Park, Moon, Kim, Chung & Sohn 2005) and (Park et al 2006) outline the mergence of XML Signature and Encryption for Location Based Services (LBS) in mobile environment.…”
Section: Observation 1: Bad Performance and Memory Inefficiency Of Xmmentioning
confidence: 99%
See 1 more Smart Citation