Search results for " encryption"

showing 10 items of 38 documents

Requirements for XML document database systems

2001

The shift from SGML to XML has created new demands for managing structured documents. Many XML documents will be transient representations for the purpose of data exchange between different types of applications, but there will also be a need for effective means to manage persistent XML data as a database. In this paper we explore requirements for an XML database management system. The purpose of the paper is not to suggest a single type of system covering all necessary features. Instead the purpose is to initiate discussion of the requirements arising from document collections, to offer a context in which to evaluate current and future solutions, and to encourage the development of proper …

Document Structure DescriptionXML EncryptionDatabaseComputer scienceEfficient XML InterchangeXML validationcomputer.file_formatDocument type definitioncomputer.software_genreXML databaseXML Schema EditorStreaming XMLComputingMethodologies_DOCUMENTANDTEXTPROCESSINGcomputerProceedings of the 2001 ACM Symposium on Document engineering
researchProduct

Ontology-based integration of XML data: Schematic marks as a bridge between syntax and semantic level

2007

This paper presents an ontology integration approach of XML data. The approach is composed of two pillars the first of which is based on formal language and XML grammars analysis. The second pillar is based on ontology and domain ontology analysis. The keystone of this architecture which creates a bridge between the two pillars is based on the concept of schematic marks introduced in this paper. These schematic marks make it possible to establish the link between the syntactic level and the semantic level for our integration framework.

Document Structure DescriptionXML EncryptionInformation retrievalComputer scienceXML Schema EditorOntology-based data integrationStreaming XMLXML validationXML schemaOntology (information science)computercomputer.programming_language
researchProduct

XML document-grammar comparison: related problems and applications

2011

10.2478/s13537-011-0005-1; International audience; XML document comparison is becoming an ever more popular research issue due to the increasingly abundant use of XML. Likewise, a growing interest fosters the development of XML grammar matching and comparison, due to the proliferation of heterogeneous XML data sources, particularly on the Web. Nonetheless, the process of comparing XML documents with XML grammars, i.e., XML document and grammar similarity evaluation, has not yet received the attention it deserves. In this paper, we provide an overview on existing research related to XML document/grammar comparison, presenting the background and discussing the various techniques related to th…

Document Structure DescriptionXML grammarXML Encryptionselective disseminationGeneral Computer ScienceComputer scienceEfficient XML Interchange[SCCO.COMP]Cognitive science/Computer scienceWell-formed document02 engineering and technologyWorld Wide WebXML Schema Editor[SCCO.COMP] Cognitive science/Computer science020204 information systemsStreaming XML0202 electrical engineering electronic engineering information engineeringPROCESSAMENTO DE IMAGENSXML schemacomputer.programming_languageInformation retrievalXSDgrammar evolutionXML validationstructural similarityQA75.5-76.95computer.file_formatXMLDTDclassificationElectronic computers. Computer science[ SCCO.COMP ] Cognitive science/Computer scienceComputingMethodologies_DOCUMENTANDTEXTPROCESSING020201 artificial intelligence & image processingsemi-structured datacomputerclusteringstructure transformation
researchProduct

Extensible User-Based XML Grammar Matching

2009

International audience; XML grammar matching has found considerable interest recently due to the growing number of heterogeneous XML documents on the web and the increasing need to integrate, and consequently search and retrieve XML data originated from different data sources. In this paper, we provide an approach for automatic XML grammar matching and comparison aiming to minimize the amount of user effort required to perform the match task. We propose an open framework based on the concept of tree edit distance, integrating different matching criterions so as to capture XML grammar element semantic and syntactic similarities, cardinality and alternativeness constraints, as well as data-ty…

Document Structure Description[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR]XML Encryption[INFO.INFO-WB] Computer Science [cs]/WebComputer sciencecomputer.internet_protocolEfficient XML Interchange[ INFO.INFO-WB ] Computer Science [cs]/WebXML Signature[SCCO.COMP]Cognitive science/Computer science02 engineering and technologycomputer.software_genreSchema matchingSimple API for XML[SCCO.COMP] Cognitive science/Computer scienceXML Schema Editor020204 information systemsStreaming XML0202 electrical engineering electronic engineering information engineering[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]RELAX NGXML schemaBinary XMLSGML[ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM]computer.programming_language[INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM]Information retrieval[INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB][INFO.INFO-WB]Computer Science [cs]/Web[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]XML validationcomputer.file_formatXML framework[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB]XML databaseXML Schema (W3C)[ SCCO.COMP ] Cognitive science/Computer science[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR]Vector space model020201 artificial intelligence & image processing[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]computerXMLXML Catalog
researchProduct

Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study

2022

In this study, we implemented an integrated security solution with Spring Security and Keycloak open-access platform (SSK) to secure data collection and exchange over microservice architecture application programming interfaces (APIs). The adopted solution implemented the following security features: open authorization, multi-factor authentication, identity brokering, and user management to safeguard microservice APIs. Then, we extended the security solution with a virtual private network (VPN), Blowfish and crypt (Bcrypt) hash, encryption method, API key, network firewall, and secure socket layer (SSL) to build up a digital infrastructure. To accomplish and describe the adopted SSK solutio…

Electrical and Electronic EngineeringAPI; REST; spring-boot; Keycloak; authentication; authorization; encryption; external attacksVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550BiochemistryInstrumentationComputer SecuritySoftwareAtomic and Molecular Physics and OpticsAnalytical ChemistrySensors
researchProduct

Security of public key cryptosystems based on Chebyshev Polynomials

2004

Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptography. Moreover, they satisfy a semi-group property, which makes possible implementing a trapdoor mechanism. In this paper we study a public key cryptosystem based on such polynomials, which provides both encryption and digital signature. The cryptosystem works on real numbers and is quite efficient. Unfortunately, from our analysis it comes up that it is not secure. We describe an attack which permits to recover the corresponding plaintext from a given ciphertext. The same attack can be applied to produce forgeries …

FOS: Computer and information sciencesPlaintext-aware encryptionTheoretical computer scienceComputer Science - Cryptography and SecurityCramer–Shoup cryptosystemData_CODINGANDINFORMATIONTHEORYDeterministic encryptionHybrid cryptosystemCryptosystemElectrical and Electronic EngineeringSemantic securityThreshold cryptosystemCryptography and Security (cs.CR)Goldwasser–Micali cryptosystemMathematics
researchProduct

H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks

2009

In unattended wireless sensor networks, data are stored locally and retrieved on demand. To efficiently transmit the collector’s retrieval results, data are aggregated along being forwarded. The data confidentiality and integrity should be protected at the intermediate nodes. End-to-end encryption or hop-by-hop encryption based schemes are not efficient. Straightforward homomorphic encryption based scheme is not compromise resilient. To achieve all the desires, we propose a scheme - H2S by making use of both homomorphic secret sharing and homomorphic encryption. The security and efficiency of our scheme are justified by extensive analysis.

Homomorphic secret sharingComputer sciencebusiness.industryClient-side encryptionEncryptioncomputer.software_genreMultiple encryptionProbabilistic encryptionComputer Science::MultimediaComputer Science::Networking and Internet Architecture40-bit encryptionAttribute-based encryptionOn-the-fly encryptionbusinesscomputerComputer Science::Cryptography and SecurityComputer network2009 Fifth International Conference on Information Assurance and Security
researchProduct

A distributed data storage and retrieval scheme in unattended WSNs using Homomorphic Encryption and secret sharing

2009

Many data storage schemes have been proposed in the past for keeping dependable data storage, but they are not designed for Unattended Wireless Sensor Networks (UWSNs). When applying these schemes to UWSNs, most of them have limitations such as high storage requirement, transmission cost, and not resilient to a large number of node compromises. To address the problem of data storage, transmission cost, and resilience of node compromise in UWSNs, we propose a novel Homomorphic Encryption and Homomorphic Secret Sharing based scheme (HEHSS) to accomplish the goals of confidentiality, resilience to node compromises, reliability, and efficiency of storage and transmission. Our scheme exploits th…

Homomorphic secret sharingbusiness.industryComputer scienceNode (networking)Distributed data storeHomomorphic encryptionCryptographybusinessEncryptionSecret sharingWireless sensor networkComputer network2009 2nd IFIP Wireless Days (WD)
researchProduct

Roadmap on 3D integral imaging: Sensing, processing, and display

2020

This Roadmap article on three-dimensional integral imaging provides an overview of some of the research activities in the field of integral imaging. The article discusses various aspects of the field including sensing of 3D scenes, processing of captured information, and 3D display and visualization of information. The paper consists of a series of 15 sections from the experts presenting various aspects of the field on sensing, processing, displays, augmented reality, microscopy, object recognition, and other applications. Each section represents the vision of its author to describe the progress, potential, vision, and challenging issues in this field.

Image qualityComputer scienceReconeixement òptic de formesComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage processing02 engineering and technologySeguretat informàticaStereo display01 natural sciencesXifratge (Informàtica)Field (computer science)010309 opticsOpticsHuman–computer interactionComputer security0103 physical sciencesMicroscopyComunicacions òptiquesData encryption (Computer science)Integral imagingOptical pattern recognitionbusiness.industryOptical communicationsCognitive neuroscience of visual object recognitionÒptica021001 nanoscience & nanotechnologyAtomic and Molecular Physics and OpticsProcessament òptic de dadesVisualizationHolographic displayAugmented realityOptical data processing0210 nano-technologybusinessImatges Processament Tècniques digitals
researchProduct

Multiplexing of encrypted data using fractal masks

2012

In this Letter, we present to the best of our knowledge a new all-optical technique for multiple-image encryption and multiplexing, based on fractal encrypting masks. The optical architecture is a joint transform correlator. The multiplexed encrypted data are stored in a photorefractive crystal. The fractal parameters of the key can be easily tuned to lead to a multiplexing operation without cross talk effects. Experimental results that support the potential of the method are presented.

ImaginationImage EncryptionSystemComputer sciencemedia_common.quotation_subjectComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONTransformPhysics::OpticsStorageEncryptionMultiplexingCrosstalkSearch engineOpticsFractalElectronic engineeringDomainComputer Science::Information TheoryComputer Science::Cryptography and Securitymedia_commonbusiness.industryAtomic and Molecular Physics and OpticsOptical encryptionFISICA APLICADAPhotorefractive crystalOptical EncryptionbusinessTelecommunications
researchProduct