Skip to main content

A Two-Phase Local Server Security Model Based on XML Certificate

  • Conference paper
Computational Science and Its Applications - ICCSA 2006 (ICCSA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3984))

Included in the following conference series:

  • 872 Accesses

Abstract

This paper proposes server security certificate management system applying the mechanism of public key infrastructure and XML Security technology specification to secure the information and resources open in network. This model is the system that permits the access only to the authorized users at a request of the status of the certificate through certifying server after issuing and requesting wire, wireless certificate on-line and registering on the XML certificate managing server. Also, this paper investigates the methods to support independent and various styles of information exchanges at platform using SOAP Message to provide remote server with the service of certificate request and inquiry.

This work was supported by Korea Research Foundation Grant (KRF-2004-042-D00168).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Moon, K.-Y.: XML XML information protection abstract. KIPS journal 10(2), 108–116 (2003)

    Google Scholar 

  2. Lee, H.-s.: Design and Implementation of EC Server Security based on XML Digital Signature. In: Proceedings of the 29th KISS Spring Conference, pp. 760–792 (April 2002)

    Google Scholar 

  3. Kim, S.-Y.: Design and Implementation of e-commerce system Supporting XML Digital Signature. In: Proceedings of KISS Conference, vol. 28(2), pp. 766–768 (2001)

    Google Scholar 

  4. Lim, H.-Y.: Bundle Authentication using XML Signature in the OSGi Service Platform. In: Proceedings of the KISS Conference, vol. 31(1), pp. 196–198 (2004)

    Google Scholar 

  5. Lee, W.-J.: XML Signature Scheme with Time Stamping Protocol. In: Proceedings of the KISS Conference, vol. 31(1), pp. 214–216 (2004)

    Google Scholar 

  6. Bertino, E., Carminati, B., Ferrari, E.: XML security. Information Security Technical Report, 6(2), 44-58 (June 1, 2001)

    Google Scholar 

  7. Kim, Y.-D.: Extention of Kailar Accountability Logic for Symmetric Key Digital Signature and Accountability Analysis of an Electronic Payment Protocal. The Transactions of the KISS Processing Society 9(3), 3046–3059 (1999)

    Google Scholar 

  8. http://www.w3c.org/TR/2002/REC-xmldsig-core-20020212/

  9. http://www.w3c.org/TR/xmldsig-core

  10. Blyth, A., Cunliffe, D., Sutherland, I.: Security analysis of XML usage and XML parsing. Computers & Security 22(6), 494–505 (2003)

    Article  Google Scholar 

  11. Bertino, E., Carminati, B., Ferrari, E.: XML security. Information Security Technical Report 6(2), 44–58 (2001)

    Article  Google Scholar 

  12. Komathy, K., Ramachandran, V., Vivekanandan, P.: Security for XML messaging services—a component-based approach. Journal of Network and Computer Applications 26(2), 197–211 (2003)

    Google Scholar 

  13. Gómez, A.F., Martínez, G., Cánovas, Ó.: New security services based on PKI. Future Generation Computer Systems 19(2), 251–262 (2003)

    Article  Google Scholar 

  14. Farrell, S., Zolotarev, M.: XML and PKI — What’s the story? Network Security 2001(9), 7–10 (2001)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, YH., Kim, JS., Kim, YS., Shim, JS. (2006). A Two-Phase Local Server Security Model Based on XML Certificate. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3984. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751649_106

Download citation

  • DOI: https://doi.org/10.1007/11751649_106

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34079-9

  • Online ISBN: 978-3-540-34080-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics