XML Encryption
Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator

Posts: 3,048
Joined: Dec 2008
08-04-2009, 10:40 AM


As XML becomes a predominant means of linking blocks of information together, there is a requirement to secure specific information. That is to allow authorized entities access to specific information and prevent access to that specific information from unauthorized entities. Current methods on the Internet include password protection, smart card, PKI, tokens and a variety of other schemes. These typically solve the problem of accessing the site from unauthorized users, but do not provide mechanisms for the protection of specific information from all those who have authorized access to the site.

Now that XML is being used to provide searchable and organized information there is a sense of urgency to provide a standard to protect certain parts or elements from unauthorized access. The objective of XML encryption is to provide a standard methodology that prevents unauthorized access to specific information within an XML document.

XML (Extensible Markup Language) was developed by an XML Working Group (originally known as the SGML Editorial Review Board) formed under the auspices of the World Wide Web Consortium (W3C) in 1996. Even though there was HTML, DHTML AND SGML XML was developed byW3C to achieve the following design goals.

" XML shall be straightforwardly usable over the Internet.
" XML shall be compatible with SGML.
" It shall be easy to write programs, which process XML documents.
" The design of XML shall be formal and concise.
" XML documents shall be easy to create.

XML was created so that richly structured documents could be used over the web. The other alternate is HTML and SGML are not practical for this purpose.HTML comes bound with a set of semantics and does not provide any arbitrary structure. Even though SGML provides arbitrary structure, it is too difficult to implement just for web browser. Since SGML is so comprehensive that only large corporations can justify the cost of its implementations.

The eXtensible Markup Language, abbreviated as XML, describes a class of data objects called XML documents and partially describes the behavior of computer programs which process them. Thus XML is a restricted form of SGML

A data object is an XML document if it is well-formed, as defined in this specification. A well-formed XML document may in addition be valid if it meets certain further constraints.Each XML document has both a logical and a physical structure. Physically, the document is composed of units called entities. An entity may refer to other entities to cause their inclusion in the document. A document begins in a "root" or document entity
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
seminar paper
Active In SP

Posts: 6,455
Joined: Feb 2012
06-03-2012, 10:26 AM

to get information about the topic "xml encryption" full report ppt and related topic refer the link bellow


Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: latest information about palladium cryptography, disadvantages of xml encryption when creating a well formed xml documents, xml encryption that supports algorithms and technques, palladium cryptography doc free download, projects in xml encryption, seminar on xml encryption, xml encryption techniques,
Popular Searches: xml encryption example, at89c51 microcontroller in encryption, an introduction to xml encryption and xml signature, project in java on encryption, sta je xml, projects in xml encryption, seminar topic on xml,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  XML encryption full report computer science technology 7 6,630 24-03-2014, 02:31 PM
Last Post: seminar project topic
  International Data Encryption Algorithm Report study tips 0 527 22-08-2013, 04:55 PM
Last Post: study tips
  VLSI Realization of a Secure Cryptosystem for Image Encryption and Decryption pdf study tips 0 517 20-08-2013, 04:51 PM
Last Post: study tips
  BLOWFISH ALGORITHM ENCRYPTION PPT study tips 0 414 14-06-2013, 02:49 PM
Last Post: study tips
  Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing pdf study tips 0 344 05-06-2013, 03:47 PM
Last Post: study tips
  Leveraging XML Technologies in Developing Program Analysis Tools Report study tips 0 311 31-05-2013, 04:04 PM
Last Post: study tips
  A Lightweight High-Performance Fault Detection Scheme for the Advanced Encryption study tips 0 329 06-05-2013, 04:58 PM
Last Post: study tips
  AES: The Advanced Encryption Standard study tips 0 348 17-04-2013, 04:34 PM
Last Post: study tips
  Introduction to XML Schema ppt study tips 1 497 07-03-2013, 11:14 AM
Last Post: study tips
  A SEMINAR REPORT ON DATA ENCRYPTION PPT study tips 0 484 04-03-2013, 11:44 AM
Last Post: study tips