Skip to main content

XML Security Model for Secure Information Exchange in E-Commerce

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3983))

Abstract

The most important technology in the electronic commerce based on Internet is to guarantee the security of trading information exchange.  Many technologies are proposed as a standard to support this security problem.  One of them is an XML (eXtensible Markup Language).  This is used in various applications as the document standard for electronic commerce system.  The XML security has become very important topic.

In this paper an XML security model for web services based electronic commerce system to guarantee the secure exchange of trading information is proposed.  To accomplish the security of XML, the differences of XML signature, XML encryption and XML key management scheme respect to the conventional system should be provided.  The new architecture is proposed based on unique characteristics of XML.  Especially the method to integrate the process management system need to the electronic commerce is proposed.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. RFC: 2560 X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP (June 1996)

    Google Scholar 

  2. www.w3.org , Extensible Markup Language (XML), http://www.w3c.org/XML (February 1998)

  3. www.w3.org , XML Signature Requirements WD, W3C Working Draft (October 1999)

  4. www.w3c.org , XML-Signature Syntax and Processing, W3C Recommendation (February 2002)

  5. www.w3c.org , XML Encryption Syntax and Processing, W3C Working Draft (October 2001)

  6. www.w3c.org , Decryption Transform for XML Signature, W3C Working Draft (October 2001)

  7. Takase, T., et al.: XML Digital Signature System Independent Existing Applications. In: Proceedings of the 2002 Symposium on Application and the Internet, pp. 150–157 (2002)

    Google Scholar 

  8. Xavier, E.: XML based Security for E-Commerce Applications. In: Eighth Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, pp. 10–17 (2001)

    Google Scholar 

  9. Cho, K.M.: Framework of Content Distribution in Mobile Network Environment. In: Proceedings of the 2003 International Conference on Internet Computing (IC 2003), June 2003, pp. 429–434 (2003)

    Google Scholar 

  10. Cho, K.M.: Packaging Strategies of Multimedia Content in DRM. In: Proceedings of the 2003 International Conference on Internet Computing (IC 2003), June 2003, pp. 243–248 (2003)

    Google Scholar 

  11. Cho, K.M.: Web Services based XML Security Model for Secure Information Exchange in Electronic Commerce. The Journal of Korean Association of Computer Education 7(5), 93–99 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cho, K.M. (2006). XML Security Model for Secure Information Exchange in E-Commerce. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3983. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751632_108

Download citation

  • DOI: https://doi.org/10.1007/11751632_108

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34077-5

  • Online ISBN: 978-3-540-34078-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics