Secure SAML validation to prevent XML signature wrapping attacks.
Pawel KrawczykPublished in: CoRR (2014)
Keyphrases
- markup language
- sql injection
- security mechanisms
- secure routing
- digital signature
- stream cipher
- cryptographic protocols
- security protocols
- chosen plaintext
- xml documents
- security measures
- security issues
- countermeasures
- web applications
- xml schema
- xml data
- cryptographic algorithms
- security flaws
- security threats
- remote user authentication scheme
- key management
- information leakage
- data model
- unauthorized access
- private key
- smart card
- xml databases
- advanced encryption standard
- metadata
- data exchange
- block cipher
- multi domain
- relational databases
- data integration
- blind signature
- access control
- security requirements
- databases
- signature verification
- resource constrained
- sensitive data
- information security
- authentication scheme
- key distribution
- security vulnerabilities
- watermarking technique
- secret key
- watermarking scheme
- database systems
- keyword search
- ad hoc networks
- routing protocol