Security analysis of cryptographically controlled access to XML documents.
Martín AbadiBogdan WarinschiPublished in: J. ACM (2008)
Keyphrases
- security analysis
- xml documents
- smart card
- public key
- security requirements
- access control
- high security
- image encryption
- security properties
- user authentication
- authentication protocol
- encryption scheme
- relational databases
- image compression
- data model
- low cost
- object oriented
- wireless sensor networks
- authentication scheme
- video sequences
- mutual authentication