Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
RFC3075: XML-Signature Syntax and Processing2001 RFC
Reflects downloads up to 13 Sep 2024Bibliometrics
Skip Abstract Section
Abstract

This document specifies XML (Extensible Markup Language) digital signature processing rules and syntax. XML Signatures provide integrity, message authentication, and/or signer authentication services for data of any type, whether located within the XML that includes the signature or elsewhere.

RFC Downloads

Cited By

  1. ACM
    Magdy A, Mohamed A, Quirchmayr G and Schikuta E Towards a security and privacy protection model for semantic query engines Proceedings of the 19th International Conference on Information Integration and Web-based Applications & Services, (198-207)
  2. Meyer C, Feldmann F and Schwenk J Sometimes it's better to be STUCK! SAML transportation unit for cryptographic keys Proceedings of the 15th international conference on Information Security and Cryptology, (110-125)
  3. ACM
    Bengtson J, Bhargavan K, Fournet C, Gordon A and Maffeis S (2011). Refinement types for secure implementations, ACM Transactions on Programming Languages and Systems (TOPLAS), 33:2, (1-45), Online publication date: 1-Jan-2011.
  4. ACM
    Rönnau S, Pauli C and Borghoff U Merging changes in XML documents using reliable context fingerprints Proceedings of the eighth ACM symposium on Document engineering, (52-61)
  5. ACM
    Boyer J Interactive office documents Proceedings of the eighth ACM symposium on Document engineering, (8-17)
  6. López G, Cánovas O, Gómez A, Jiménez J and Marín R (2007). A network access control approach based on the AAA architecture and authorization attributes, Journal of Network and Computer Applications, 30:3, (900-919), Online publication date: 1-Aug-2007.
  7. ACM
    Camenisch J, Gross T and Sommer D Enhancing privacy of federated identity management protocols Proceedings of the 5th ACM workshop on Privacy in electronic society, (67-72)
  8. ACM
    Backes M and Groβ T Tailoring the Dolev-Yao abstraction to web services realities Proceedings of the 2005 workshop on Secure web services, (65-74)
  9. Lopez G, Gomez A, Marin R and Canovas O A Network Access Control Approach Based on the AAA Architecture and Authorization Attributes Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
  10. ACM
    Bhargavan K, Fournet C and Gordon A A semantics for web services authentication Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (198-209)
  11. ACM
    Bhargavan K, Fournet C and Gordon A (2004). A semantics for web services authentication, ACM SIGPLAN Notices, 39:1, (198-209), Online publication date: 1-Jan-2004.
  12. ACM
    Boyer J Bulletproof business process automation Proceedings of the 2003 ACM workshop on XML security, (104-111)
  13. ACM
    Perrin T Public key distribution through "cryptoIDs" Proceedings of the 2003 workshop on New security paradigms, (87-102)
  14. ACM
    Kuo C and Humenn P Dynamically authorized role-based access control for secure distributed computation Proceedings of the 2002 ACM workshop on XML security, (97-103)
  15. ACM
    Geuer-Pollmann C XML pool encryption Proceedings of the 2002 ACM workshop on XML security, (1-9)
  16. ACM
    Devanbu P, Gertz M, Kwong A, Martel C, Nuckolls G and Stubblebine S Flexible authentication of XML documents Proceedings of the 8th ACM conference on Computer and Communications Security, (136-145)
Contributors
  • Northeastern University

Recommendations