Balisage Paper: Secured Management of Online XML Document Services through Structure Preserving Asymmetric Encryption

Balisage: The Markup Conference 2011
August 2 - 5, 2011

The materials listed below were provided by the speaker as supplements to a presentation at Balisage. These materials may include the slides or visuals used in the presentation; supplementary material, such as code samples or a demonstration application; and/or the paper accompanying the presentation (if it has not been provided in XML). These materials have been zipped for easy download and are identified by a brief description of the contents. The materials themselves are untouched, that is, they have not been tested or edited by Balisage: The Markup Conference or by Mulberry Technologies, Inc. As such, they are included on this website AS IS, i.e., as provided by the speaker, with no warranties, express or otherwise, made by Balisage or Mulberry.

Slides and Materials

×

SCAN, Trusted ICT Security Solution Provider. http://www.scan-associates.net/product_securedoc.htm

×

VaultMate, Enterprise Privacy Solution. http://www.vaultmate.com/features.php

×

Public-key Cryptography, Wikipedia. http://en.wikipedia.org/wiki/Public_key_encryption

×

Symmetric-Key Algorithm, Wikipedia. http://en.wikipedia.org/wiki/Symmetric_key_algorithm

×

Homomorphic Encryption, Wikipedia. http://en.wikipedia.org/wiki/Homomorphic_encryption

×

Optimal Asymmetric Encryption Padding, Wikipedia. http://en.wikipedia.org/wiki/Optimal_Asymmetric_Encryption_Padding

×

Optimal Asymmetric Encryption -- How to encrypt with RSA, M. Bellare, P. Rogaway. Extended abstract in Advances in Cryptology - Eurocrypt '94 Proceedings, Lecture Notes in Computer Science Vol. 950, A. De Santis ed, Springer-Verlag, 1995. http://www-cse.ucsd.edu/users/mihir/papers/oae.pdf

×

OAEP Reconsidered, Victor Shoup. IBM Zurich Research Lab, Saumerstr. 4, 8803 Ruschlikon, Switzerland. September 18, 2001. (Full length version of the extended abstract in Proc. Crypto 2001) http://www.shoup.net/papers/oaep.pdf

×

Querying Encrypted XML Documents, Ravi Chandra Jammalamadaka and Sharad Mehrotra. Proceedings of the 10th International Database Engineering and Applications Symposium, p.129-136, December 11-14, 2006 doi:https://doi.org/10.1109/IDEAS.2006.39

×

The FIPS 180-2 publication on Secure Hash Algorithms, NIST. http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf

×

Securing XML data in third-party distribution systems, Barbara Carminati, Elena Ferrari, and Elisa Bertino. Proceedings of the 14th ACM international conference on Information and knowledge management (CIKM '05), New York, NY, USA. doi:https://doi.org/10.1145/1099554.1099575

×

Efficient Secure Query Evaluation over Encrypted XML Database, Hui Wang and Laks V.S. Lakshmanan. VLDB „06, September 12-15, 2006, Seoul, Korea.

×

A Survey on Querying Encrypted XML Documents for Databases as a Service, Ozan Ünay and Taflan Gündem. SIGMOD Record, March 2008 (Vol. 37, No. 1)

×

Configuring Database Indexes, eXist Open Source Native Database, http://exist.sourceforge.net/indexing.html#structuralidx

×

Administration Guide, Xindices 1.1, The Apache XML project, http://xml.apache.org/xindice/1.1/guide-administrator.html#Managing+Indexes

×

SemCrypt-Ensuring Privacy of Electronic Documents Through Semantic-Based Encrypted Query Processing, M. Schrefl, K. Grun, and J. Dorn. Proceedings of the 21st International conference on Data Engineering Workshop, 2005, IEEE computer society.

×

Queriable Hierarchical Data,, Sumit Mittal and Biplav Srivastava. US patent, US 2008/0071814 A1 http://www.google.com/patents/about?id=1WuoAAAAEBAJ

×

Exploring Queriability of Encrypted and Compressed XML Data , I. Elgedawy, B. Srivastava, and S. Mittal. 24th International Symposium on Computer and Information Sciences, 14-16 Sept. 2009 (ISCIS 2009). doi:https://doi.org/10.1109/ISCIS.2009.5291834

×

XML Encryption Syntax and Processing, W3C recommendation, 10 December 2002. http://www.w3.org/TR/xmlenc-core/