SlideShare uma empresa Scribd logo
1 de 18
Baixar para ler offline
Table of Contents
 ž  Introduction
 ž  XML (eXtensible Markup Language)
 ž  XML Security
       —  Element wise Encryption
       —  Access Control Model
 ž  XSLT (eXtensible Stylesheet Language Transformations)
 ž  XML Security using XSLT
 ž  Conclusion
 ž  References
Introduction
ž    XML (eXtensible Markup Language) - the
      “love child” of W3C (World Wide Web
      Consortium)
ž    XML - Mainly used for B2B messaging




ž    Biggest concern for customer is security
Introduction (contd.)
ž    XML inherits transport layer security such
      as SSL as used in HTML for basic security
ž    Some security features of XML are beyond
      transport layer security
ž    This project addresses the specific security
      features of XML by
      —  Describing an access control model &
      —  Performing cryptographic transformations on it
Introduction (contd.)
ž    XSLT (eXtensible Stylesheet Language
      Transformations)
ž    XSLT may well have sufficient functionality
      to perform all reasonable cryptographic
      transformations.
ž    We extend the XSLT Processor to provide
      encryption and decryption functions
ž    We also implement a real world application
      in PHP, utilizing the cryptographic functions
      in the XSLT processor
XML
ž  XML  is open standard for cross
  application communication

ž  XMLallows users to structure and label
  information separately from the
  presentation of that information.

ž  An XML document must adhere to
  particular syntax and semantics as
  outlined in XML Specification by W3C
XML (contd.)
ž    XML is generally parsed or manipulated
      using Document Object Model (DOM)
ž    DOM allows navigation of an XML
      document as if it were a tree with node
      objects as branches

 <payment type=card”>
     <issuer>    Card Company A              </issuer>
     <cardinfo>
         <name>        ADAM ISHMAEL          </name>
         <expiration> 04/2010                </expiration>
         <number>      5283 8304 6232 0010   </number>
     </cardinfo>
 </payment>
XML Security
ž    XML uses existing Transport Layer Security
      (TLS) mechanism such as SSL for basic end
      to end communication security

ž    TLS prevents eavesdropping, tampering, and
      message forgery between a client and server

ž    TLS doesn’t address some specific XML
      Security features such as:
      —  Element Wise Encryption
      —  Digital Signature and
      —  Access Control
Element Wise Encryption
ž  Element-wise encryption allows the user
  to select the data fields to be encrypted

ž  Therefore,the remaining nonconfidential
  data fields will be readable.

ž  Instead of the encrypting an entire
  document, it is enough to encrypt only a
  part of it which should be confidential.
Element Wise Encryption (contd.)
ž    An Example:
 <payment type=card”>
     <issuer>Card Company A</issuer>
     <cardinfo>
         <name>        ADAM ISHMAEL          </name>
         <expiration> 04/2010                </expiration>
         <number>      5283 8304 6232 0010   </number>
     </cardinfo>
 </payment>

ž    Card Info Encrypted
 <payment type=card”>
     <issuer>Card Company A</issuer>
     <EncryptedElement contentType=”text/plain”
     algorithm=”DES” encoding=”base64”>
         PHJvdz4KICAglCAgPGNvbCBwYWNrZWQ9lmJhc2U2NCl+
     </EncryptedElement>
 </payment>
XML Access Control Model
ž  Providing
            the right people with the right
  access to information is as important as
  having the information in the first place

ž  XMLAccess Control is performed by
  providing XML documents with a
  sophisticated access control model by
  applying appropriate encryption /
  decryption transformation
XML Access Control Model
XSLT
ž    XSLT (eXtensible Stylesheet
      Language Transformations) is a
      W3C specification for a document
      manipulation language capable of
      restructuring documents and
      performing computations on their
      elements.
XML Security using XSLT
ž    If we regard encryption/decryption as just
      another XML document transformation
      operation, then it is apparent that the
      advantages XSLT

ž    We propose a model to implement the
      various XML security features using XSLT
      thus making it possible for a standard XSLT
      processor to provide XML security
      functions.
XML Security using XSLT
Conclusion
ž    XSLT processors remain as a standard
      specification in the client side, the server side and
      can be implemented anywhere in a business
      application
ž    Our proposal thus makes encryption / decryption
      of an XML Document possible just by using a XSL
      encrypting / decrypting document
ž    The project thus extends the XSLT processor to
      provide encryption and decryption functions and
      implement an Access Control Model
ž    For demonstration of the cryptographic capabilities
      implemented using XSLT processor, a real world
      application is developed using PHP
References
ž    Kayvan Farzaneh; Mahmood Doroodchi, "XML Security
      beyond XSLT," Innovations in Information Technology, 2006 ,
      pp.1-5, Nov. 2006


ž    Maruyama H. and Imamura T., “Element-Wise XML
      Encryption”, April 2000.

ž    W3C, “Extensible Markup Language (XML) 1.0 (Fifth Edition)
      W3C Recommendation 26 November 2008”


ž    W3C, “XSL Transformations (XSLT) Version 2.0 W3C
      Recommendation 23 January 2007”
Thank You…
ž    Read the research whitepaper here:
      Slideshare.net

ž    Like this presentation? Share it...

ž    Questions? Tweet me @ahmedmzl

ž    This presentation was presented at the National
      Conference on Computational Intelligence and
      Network Security, April 2009

Mais conteúdo relacionado

Mais procurados (19)

Chapter 18
Chapter 18Chapter 18
Chapter 18
 
Xslt
XsltXslt
Xslt
 
XML
XMLXML
XML
 
Xpath
XpathXpath
Xpath
 
Introductionto xslt
Introductionto xsltIntroductionto xslt
Introductionto xslt
 
treeview
treeviewtreeview
treeview
 
Xpath
XpathXpath
Xpath
 
What is the world wide web how does it work.docx
What is the world wide web how does it work.docxWhat is the world wide web how does it work.docx
What is the world wide web how does it work.docx
 
Xml
XmlXml
Xml
 
Xml PPT
Xml PPTXml PPT
Xml PPT
 
light_xml
light_xmllight_xml
light_xml
 
E05412327
E05412327E05412327
E05412327
 
Building XML Based Applications
Building XML Based ApplicationsBuilding XML Based Applications
Building XML Based Applications
 
What is xml
What is xmlWhat is xml
What is xml
 
Lecture 2 - Using XML for Many Purposes
Lecture 2 - Using XML for Many PurposesLecture 2 - Using XML for Many Purposes
Lecture 2 - Using XML for Many Purposes
 
XSLT Formats in Website Templates in Cascade Server CMS by Jay Mercer
XSLT Formats in Website Templates in Cascade Server CMS by Jay MercerXSLT Formats in Website Templates in Cascade Server CMS by Jay Mercer
XSLT Formats in Website Templates in Cascade Server CMS by Jay Mercer
 
XPath Introduction
XPath IntroductionXPath Introduction
XPath Introduction
 
Xml iet 2015
Xml iet 2015Xml iet 2015
Xml iet 2015
 
Session 4
Session 4Session 4
Session 4
 

Semelhante a XML Security Using XSLT

Element wise encryption of XML using XSLT
Element wise encryption of XML using XSLTElement wise encryption of XML using XSLT
Element wise encryption of XML using XSLTAhmed Muzammil
 
Parsing of xml file to make secure transaction in mobile commerce
Parsing of xml file to make secure transaction in mobile commerceParsing of xml file to make secure transaction in mobile commerce
Parsing of xml file to make secure transaction in mobile commerceijcsa
 
Designing A Logical Security Framework for E-Commerce System Based on SOA
Designing A Logical Security Framework for E-Commerce System Based on SOA  Designing A Logical Security Framework for E-Commerce System Based on SOA
Designing A Logical Security Framework for E-Commerce System Based on SOA ijsc
 
Designing a logical security framework
Designing a logical security frameworkDesigning a logical security framework
Designing a logical security frameworkijsc
 
Enhanced xml validation using srml01
Enhanced xml validation using srml01Enhanced xml validation using srml01
Enhanced xml validation using srml01IJwest
 
XML, XML Databases and MPEG-7
XML, XML Databases and MPEG-7XML, XML Databases and MPEG-7
XML, XML Databases and MPEG-7Deniz Kılınç
 
Xml theory 2005_[ngohaianh.info]_1_introduction-to-xml
Xml theory 2005_[ngohaianh.info]_1_introduction-to-xmlXml theory 2005_[ngohaianh.info]_1_introduction-to-xml
Xml theory 2005_[ngohaianh.info]_1_introduction-to-xmlÔng Thông
 
Web services Overview in depth
Web services Overview in depthWeb services Overview in depth
Web services Overview in depthAbdulImrankhan7
 
XML External Entity (XXE)
XML External Entity (XXE)XML External Entity (XXE)
XML External Entity (XXE)Jay Thakker
 
A novel approach for Multi-Tier security for XML based documents
A novel approach for Multi-Tier security for XML based  documentsA novel approach for Multi-Tier security for XML based  documents
A novel approach for Multi-Tier security for XML based documentsIOSR Journals
 
Ogsi protocol perspective
Ogsi protocol perspectiveOgsi protocol perspective
Ogsi protocol perspectivePooja Dixit
 

Semelhante a XML Security Using XSLT (20)

Element wise encryption of XML using XSLT
Element wise encryption of XML using XSLTElement wise encryption of XML using XSLT
Element wise encryption of XML using XSLT
 
XML Introduction
XML IntroductionXML Introduction
XML Introduction
 
Parsing of xml file to make secure transaction in mobile commerce
Parsing of xml file to make secure transaction in mobile commerceParsing of xml file to make secure transaction in mobile commerce
Parsing of xml file to make secure transaction in mobile commerce
 
Designing A Logical Security Framework for E-Commerce System Based on SOA
Designing A Logical Security Framework for E-Commerce System Based on SOA  Designing A Logical Security Framework for E-Commerce System Based on SOA
Designing A Logical Security Framework for E-Commerce System Based on SOA
 
Designing a logical security framework
Designing a logical security frameworkDesigning a logical security framework
Designing a logical security framework
 
XML Unit 01
XML Unit 01XML Unit 01
XML Unit 01
 
XML1.pptx
XML1.pptxXML1.pptx
XML1.pptx
 
Xml Overview
Xml OverviewXml Overview
Xml Overview
 
uptu web technology unit 2 Xml2
uptu web technology unit 2 Xml2uptu web technology unit 2 Xml2
uptu web technology unit 2 Xml2
 
Enhanced xml validation using srml01
Enhanced xml validation using srml01Enhanced xml validation using srml01
Enhanced xml validation using srml01
 
XML-Unit 1.ppt
XML-Unit 1.pptXML-Unit 1.ppt
XML-Unit 1.ppt
 
XML, XML Databases and MPEG-7
XML, XML Databases and MPEG-7XML, XML Databases and MPEG-7
XML, XML Databases and MPEG-7
 
Xml theory 2005_[ngohaianh.info]_1_introduction-to-xml
Xml theory 2005_[ngohaianh.info]_1_introduction-to-xmlXml theory 2005_[ngohaianh.info]_1_introduction-to-xml
Xml theory 2005_[ngohaianh.info]_1_introduction-to-xml
 
Web services Overview in depth
Web services Overview in depthWeb services Overview in depth
Web services Overview in depth
 
XML External Entity (XXE)
XML External Entity (XXE)XML External Entity (XXE)
XML External Entity (XXE)
 
A novel approach for Multi-Tier security for XML based documents
A novel approach for Multi-Tier security for XML based  documentsA novel approach for Multi-Tier security for XML based  documents
A novel approach for Multi-Tier security for XML based documents
 
Full xml
Full xmlFull xml
Full xml
 
Ogsi protocol perspective
Ogsi protocol perspectiveOgsi protocol perspective
Ogsi protocol perspective
 
Introduction to XML
Introduction to XMLIntroduction to XML
Introduction to XML
 
Xml 215-presentation
Xml 215-presentationXml 215-presentation
Xml 215-presentation
 

Mais de Ahmed Muzammil

Islam on respecting others
Islam on respecting othersIslam on respecting others
Islam on respecting othersAhmed Muzammil
 
Children upbringing in Islam, Tiger and Panda Parenting
Children upbringing in Islam, Tiger and Panda ParentingChildren upbringing in Islam, Tiger and Panda Parenting
Children upbringing in Islam, Tiger and Panda ParentingAhmed Muzammil
 
What Islam Teaches You About Healthy Food - Healthy Foods and Myths
What Islam Teaches You About Healthy Food - Healthy Foods and MythsWhat Islam Teaches You About Healthy Food - Healthy Foods and Myths
What Islam Teaches You About Healthy Food - Healthy Foods and MythsAhmed Muzammil
 
Jaspersoft Reporting v5
Jaspersoft Reporting v5Jaspersoft Reporting v5
Jaspersoft Reporting v5Ahmed Muzammil
 
Virus detection based on virus throttle technology
Virus detection based on virus throttle technologyVirus detection based on virus throttle technology
Virus detection based on virus throttle technologyAhmed Muzammil
 
Virus detection based on virus throttle technology
Virus detection based on virus throttle technologyVirus detection based on virus throttle technology
Virus detection based on virus throttle technologyAhmed Muzammil
 
An Introduction to JSON JavaScript Object Notation
An Introduction to JSON JavaScript Object NotationAn Introduction to JSON JavaScript Object Notation
An Introduction to JSON JavaScript Object NotationAhmed Muzammil
 

Mais de Ahmed Muzammil (7)

Islam on respecting others
Islam on respecting othersIslam on respecting others
Islam on respecting others
 
Children upbringing in Islam, Tiger and Panda Parenting
Children upbringing in Islam, Tiger and Panda ParentingChildren upbringing in Islam, Tiger and Panda Parenting
Children upbringing in Islam, Tiger and Panda Parenting
 
What Islam Teaches You About Healthy Food - Healthy Foods and Myths
What Islam Teaches You About Healthy Food - Healthy Foods and MythsWhat Islam Teaches You About Healthy Food - Healthy Foods and Myths
What Islam Teaches You About Healthy Food - Healthy Foods and Myths
 
Jaspersoft Reporting v5
Jaspersoft Reporting v5Jaspersoft Reporting v5
Jaspersoft Reporting v5
 
Virus detection based on virus throttle technology
Virus detection based on virus throttle technologyVirus detection based on virus throttle technology
Virus detection based on virus throttle technology
 
Virus detection based on virus throttle technology
Virus detection based on virus throttle technologyVirus detection based on virus throttle technology
Virus detection based on virus throttle technology
 
An Introduction to JSON JavaScript Object Notation
An Introduction to JSON JavaScript Object NotationAn Introduction to JSON JavaScript Object Notation
An Introduction to JSON JavaScript Object Notation
 

Último

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

XML Security Using XSLT

  • 1.
  • 2. Table of Contents ž  Introduction ž  XML (eXtensible Markup Language) ž  XML Security —  Element wise Encryption —  Access Control Model ž  XSLT (eXtensible Stylesheet Language Transformations) ž  XML Security using XSLT ž  Conclusion ž  References
  • 3. Introduction ž  XML (eXtensible Markup Language) - the “love child” of W3C (World Wide Web Consortium) ž  XML - Mainly used for B2B messaging ž  Biggest concern for customer is security
  • 4. Introduction (contd.) ž  XML inherits transport layer security such as SSL as used in HTML for basic security ž  Some security features of XML are beyond transport layer security ž  This project addresses the specific security features of XML by —  Describing an access control model & —  Performing cryptographic transformations on it
  • 5. Introduction (contd.) ž  XSLT (eXtensible Stylesheet Language Transformations) ž  XSLT may well have sufficient functionality to perform all reasonable cryptographic transformations. ž  We extend the XSLT Processor to provide encryption and decryption functions ž  We also implement a real world application in PHP, utilizing the cryptographic functions in the XSLT processor
  • 6. XML ž  XML is open standard for cross application communication ž  XMLallows users to structure and label information separately from the presentation of that information. ž  An XML document must adhere to particular syntax and semantics as outlined in XML Specification by W3C
  • 7. XML (contd.) ž  XML is generally parsed or manipulated using Document Object Model (DOM) ž  DOM allows navigation of an XML document as if it were a tree with node objects as branches <payment type=card”> <issuer> Card Company A </issuer> <cardinfo> <name> ADAM ISHMAEL </name> <expiration> 04/2010 </expiration> <number> 5283 8304 6232 0010 </number> </cardinfo> </payment>
  • 8. XML Security ž  XML uses existing Transport Layer Security (TLS) mechanism such as SSL for basic end to end communication security ž  TLS prevents eavesdropping, tampering, and message forgery between a client and server ž  TLS doesn’t address some specific XML Security features such as: —  Element Wise Encryption —  Digital Signature and —  Access Control
  • 9. Element Wise Encryption ž  Element-wise encryption allows the user to select the data fields to be encrypted ž  Therefore,the remaining nonconfidential data fields will be readable. ž  Instead of the encrypting an entire document, it is enough to encrypt only a part of it which should be confidential.
  • 10. Element Wise Encryption (contd.) ž  An Example: <payment type=card”> <issuer>Card Company A</issuer> <cardinfo> <name> ADAM ISHMAEL </name> <expiration> 04/2010 </expiration> <number> 5283 8304 6232 0010 </number> </cardinfo> </payment> ž  Card Info Encrypted <payment type=card”> <issuer>Card Company A</issuer> <EncryptedElement contentType=”text/plain” algorithm=”DES” encoding=”base64”> PHJvdz4KICAglCAgPGNvbCBwYWNrZWQ9lmJhc2U2NCl+ </EncryptedElement> </payment>
  • 11. XML Access Control Model ž  Providing the right people with the right access to information is as important as having the information in the first place ž  XMLAccess Control is performed by providing XML documents with a sophisticated access control model by applying appropriate encryption / decryption transformation
  • 13. XSLT ž  XSLT (eXtensible Stylesheet Language Transformations) is a W3C specification for a document manipulation language capable of restructuring documents and performing computations on their elements.
  • 14. XML Security using XSLT ž  If we regard encryption/decryption as just another XML document transformation operation, then it is apparent that the advantages XSLT ž  We propose a model to implement the various XML security features using XSLT thus making it possible for a standard XSLT processor to provide XML security functions.
  • 16. Conclusion ž  XSLT processors remain as a standard specification in the client side, the server side and can be implemented anywhere in a business application ž  Our proposal thus makes encryption / decryption of an XML Document possible just by using a XSL encrypting / decrypting document ž  The project thus extends the XSLT processor to provide encryption and decryption functions and implement an Access Control Model ž  For demonstration of the cryptographic capabilities implemented using XSLT processor, a real world application is developed using PHP
  • 17. References ž  Kayvan Farzaneh; Mahmood Doroodchi, "XML Security beyond XSLT," Innovations in Information Technology, 2006 , pp.1-5, Nov. 2006 ž  Maruyama H. and Imamura T., “Element-Wise XML Encryption”, April 2000. ž  W3C, “Extensible Markup Language (XML) 1.0 (Fifth Edition) W3C Recommendation 26 November 2008” ž  W3C, “XSL Transformations (XSLT) Version 2.0 W3C Recommendation 23 January 2007”
  • 18. Thank You… ž  Read the research whitepaper here: Slideshare.net ž  Like this presentation? Share it... ž  Questions? Tweet me @ahmedmzl ž  This presentation was presented at the National Conference on Computational Intelligence and Network Security, April 2009