Open Access
Issue
MATEC Web Conf.
Volume 255, 2019
Engineering Application of Artificial Intelligence Conference 2018 (EAAIC 2018)
Article Number 02016
Number of page(s) 5
Section Smart Manufacturing and Industrial 4.0
DOI https://doi.org/10.1051/matecconf/201925502016
Published online 16 January 2019
  1. H. R. Kouchaksaraei, A. G. Chefranov, Countering Wrapping Attack on XML Signature in SOAP Message for Cloud Computing”, International Journal of Computer Science and Information Security. 11, 7 (2013) [Google Scholar]
  2. M. McIntosh, P. Austel, XML signature element wrapping attacks and countermeasures, ACM Proceedings of the 2005 Workshop on Secure Web Services. 20–27 (2005) [CrossRef] [Google Scholar]
  3. n.a. “XML Signature Wrapping - Optional Element in Security Header”, WS-Attacks.org. <http://www.ws-attacks.org/XML_Signature_Wrapping_ Optional_Element_in_Security_Header>. Accessed: 12 December 2017. [Google Scholar]
  4. n.a. “XML Signature Wrapping - with Namespace Injection”, WS-Attacks.org. <http://www.ws-attacks.org/XML_Signature_Wrapping_with_Namespace_Injection>. Accessed: 12 December 2017 [Google Scholar]
  5. H. R. Kouchaksaraei, Vulnerability in cloud computing. Securing SOAP message using SESoap method. Doctoral Dissertation, Eastern Mediterranean University - Doğu Akdeniz üniversitesi (2013) [Google Scholar]
  6. K. G. A. Sawesi, M. M. Saudi, N. B. Azman, New Countermeasure Approach on XML Digital Signature Against Wrapping Attack. Advanced Science Letters. 23, 6 (2017) [Google Scholar]
  7. M. Bartel, J. Boyer, B. Fox, B. LaMacchia, E. Simon, “XML Signature Syntax and Processing Version 1.1”. World Wide Web Consortium (W3C). <https://www.w3.org/TR/xmldsig-core1/> accessed: 20 June 2014. [Google Scholar]
  8. M. A. Rahaman, A. Schaad, M. Rits, Towards secure SOAP message exchange in a SOA. Proceedings of the 3 rd ACM workshop on Secure web services, Alexandria, Virginia, USA (2006) [Google Scholar]
  9. T. Berners-Lee, R. Fielding, L. Masinter, Uniform resource identifiers (URI): Generic syntax. (1998) [Google Scholar]
  10. A. Nadalin, C. Kaler, K. Lawrence, R. Monzillo, P. Hallam-Baker, Web services security: SOAP message security 1.1. OASIS Standard (2006) [Google Scholar]
  11. S. Gajek, M. Jensen, L. Liao, J. Schwenk, Analysis of Signature Wrapping Attacks and Countermeasures. IEEE International Conference on Web Services, ICWS 2009. Los Angeles, CA, USA (2009) [Google Scholar]
  12. W. Xu, G. Jia, N. Cai, S. Huang, J. R. Davie, M. Pitz, L. Murphy, A 16 Yin Yang gene expression ratio signature for ER+/node? breast cancer. International Journal of Cancer. 140, 6 (2017) [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.