Balisage Paper: Secured Management of Online XML Document Services through Structure Preserving Asymmetric Encryption
August 2 - 5, 2011
The materials listed below were provided by the speaker as supplements to a
presentation at Balisage. These materials may include the slides or visuals used in
the
presentation; supplementary material, such as code samples or a demonstration application;
and/or the paper accompanying the presentation (if it has not been provided in XML).
These
materials have been zipped for easy download and are identified by a brief description
of
the contents. The materials themselves are untouched
, that is, they
have not been tested or edited by Balisage: The Markup Conference or by Mulberry
Technologies, Inc. As such, they are included on this website AS IS
,
i.e., as provided by the speaker, with no warranties, express or otherwise, made by
Balisage
or Mulberry.
Slides and Materials
- Bal2011-Vion-DuryPresentation.zip: Presentation slides in Microsoft PowerPoint (ppt).
SCAN, Trusted ICT Security Solution Provider. http://www.scan-associates.net/product_securedoc.htm
VaultMate, Enterprise Privacy Solution. http://www.vaultmate.com/features.php
Public-key Cryptography, Wikipedia. http://en.wikipedia.org/wiki/Public_key_encryption
Symmetric-Key Algorithm, Wikipedia. http://en.wikipedia.org/wiki/Symmetric_key_algorithm
RSA, Wikipedia. http://en.wikipedia.org/wiki/RSA
Homomorphic Encryption, Wikipedia. http://en.wikipedia.org/wiki/Homomorphic_encryption
Optimal Asymmetric Encryption Padding, Wikipedia. http://en.wikipedia.org/wiki/Optimal_Asymmetric_Encryption_Padding
Optimal Asymmetric Encryption -- How to encrypt with RSA, M. Bellare, P. Rogaway. Extended abstract in Advances in Cryptology - Eurocrypt '94 Proceedings, Lecture Notes in Computer Science Vol. 950, A. De Santis ed, Springer-Verlag, 1995. http://www-cse.ucsd.edu/users/mihir/papers/oae.pdf
OAEP Reconsidered, Victor Shoup. IBM Zurich Research Lab, Saumerstr. 4, 8803 Ruschlikon, Switzerland. September 18, 2001. (Full length version of the extended abstract in Proc. Crypto 2001) http://www.shoup.net/papers/oaep.pdf
Querying Encrypted XML Documents, Ravi Chandra Jammalamadaka and Sharad Mehrotra. Proceedings of the 10th International Database Engineering and Applications Symposium, p.129-136, December 11-14, 2006 doi:https://doi.org/10.1109/IDEAS.2006.39
The FIPS 180-2 publication on Secure Hash Algorithms, NIST. http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf
Securing XML data in third-party distribution systems, Barbara Carminati, Elena Ferrari, and Elisa Bertino. Proceedings of the 14th ACM international conference on Information and knowledge management (CIKM '05), New York, NY, USA. doi:https://doi.org/10.1145/1099554.1099575
Efficient Secure Query Evaluation over Encrypted XML Database, Hui Wang and Laks V.S. Lakshmanan. VLDB „06, September 12-15, 2006, Seoul, Korea.
A Survey on Querying Encrypted XML Documents for Databases as a Service, Ozan Ünay and Taflan Gündem. SIGMOD Record, March 2008 (Vol. 37, No. 1)
Configuring Database Indexes, eXist Open Source Native Database, http://exist.sourceforge.net/indexing.html#structuralidx
Administration Guide, Xindices 1.1, The Apache XML project, http://xml.apache.org/xindice/1.1/guide-administrator.html#Managing+Indexes
SemCrypt-Ensuring Privacy of Electronic Documents Through Semantic-Based Encrypted Query Processing, M. Schrefl, K. Grun, and J. Dorn. Proceedings of the 21st International conference on Data Engineering Workshop, 2005, IEEE computer society.
Queriable Hierarchical Data,, Sumit Mittal and Biplav Srivastava. US patent, US 2008/0071814 A1 http://www.google.com/patents/about?id=1WuoAAAAEBAJ
Exploring Queriability of Encrypted and Compressed XML Data , I. Elgedawy, B. Srivastava, and S. Mittal. 24th International Symposium on Computer and Information Sciences, 14-16 Sept. 2009 (ISCIS 2009). doi:https://doi.org/10.1109/ISCIS.2009.5291834
XML Encryption Syntax and Processing, W3C recommendation, 10 December 2002. http://www.w3.org/TR/xmlenc-core/