Results 1 to 3 of 3

Thread: XML security tips

  1. #1
    Join Date
    Nov 2009
    Posts
    76,596

    Default XML security tips

    Documents can be secured using XML now. When data is released to the web it becomes free for all and is available everywhere and it is literally omnipresent. How do you secure and safeguard something which is so widely spread. Security issues for XML documents has now reached climax because XML documents can be secured using XML security.

    XML secures the documents in two ways; one is the ML signature and the other XML encryption.


    XML Encryption

    In the World Wide Web security is taken care of by secure socket layer (SSL) and Transport Level Security (TLS). This security software's makes sure that end to end applications are safe and secure, for example email communications. But these can cater to only the end to end segment. XML Encryption takes care of the gaps in the areas where the secure socket layer or Transport level security cannot fulfill. IXML security is capable of providing end to end security and selective security.


    The XML syntax

    How XML digital signatures created are and what do they cater to? The applications of XML signatures can be extended to digitally encrypted documents and can be applied to any varied digital content including XML documents. The XML schema usually decided the XML signature application that will be used. The XML signature application can be enveloped within the document; it can be applied to documents from more than one resource.

    The most important job of an XML signature application is to specify key for the encrypted documents. It is not the applications job to reference how the keys are associated with different persons to whom the communication is digitally encrypted or carry information what the data contains. Its job is to just provide the key for accessibility.

    The specifications provided in a XML security application cannot take care of all security concerns and while the specifications cannot address them, it becomes essential to use additional keys, algorithms and rendering needs. XML uses the capital letters to carry out instructions usually in the schema. The schema is not concerned with grammar and its functionality is more to bring out the desired results by carrying out the essential commands.



    Keywords:Documents secured , XML,literally omnipresent, secure , safeguard,Security issues , XML documents, climax, XML security, XML encryption, secure socket layer ,SSL, Transport Level Security ,TLS,The XML syntax, XML digital signatures, XML signatures, XML schema , encrypted documents,XML security application ,additional keys, algorithms , essential commands.


  2. #2
    Join Date
    Mar 2012
    Posts
    6

    Default

    great tips! thanks

  3. #3
    Join Date
    Jan 2012
    Posts
    197

    Default

    Good tips. Thanks for sharing.

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •