Validation and Semantics of XML Digital Signatures

Slides:



Advertisements
Similar presentations
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Advertisements

A centre of expertise in digital information management Approaches To The Validation Of Dublin Core Metadata Embedded In (X)HTML Documents Background The.
PIS: Unit III Digital Signature & Authentication Sanjay Rawat PIS Unit 3 Digital Sign Auth Sanjay Rawat1 Based on the slides of Lawrie.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
RDF Tutorial.
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Certificates.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
X.509 Certificate management in.Net By, Vishnu Kamisetty
Exchange of digitally signed SPSCertificate messages Overview of prototype of digital signature applied to SPSCertificate message between national systems.
Cryptology Digital Signatures and Digital Certificates Prof. David Singer Dept. of Mathematics Case Western Reserve University.
Galileo - Knowledge Testing Service e-MSoft Artur Majuch.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
W3C DSig Workshop1 COSMOS - Electronic Contracting Michael Merz Ponton Hamburg.
Contracts & the Semantic Web John McClure Hypergrove Engineering Port Townsend, Washington.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Unit 1: Protection and Security for Grid Computing Part 2
Procurement Division Procurement Reform Recommendation #19  “DGS shall authorize individual signature authority for contracting and procurement officials.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
sec1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: TGa_Proposal_Antonio_Izquierdo (Protecting the Information Service.
1 Metadata –Information about information – Different objects, different forms – e.g. Library catalogue record Property:Value: Author Ian Beardwell Publisher.
Supporting further and higher education The Akenti Authorisation System Alan Robiette, JISC Development Group.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Communicating Semantics in RDF Martin Lee AND Data Ltd Oxford UK.
1 Integrating digital signatures with relational database: Issues and organizational implications By Randal Reid, Gurpreet Dhillon. Journal of Database.
Lifecycle Metadata for Digital Objects October 18, 2004 Transfer / Authenticity Metadata.
RELATORS, ROLES AND DATA… … similarities and differences.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
1 © The ATHENA Consortium. Term. Mgmt. compared to ontology creation Business importance of terms – use same term for same concept –To avoid.
Electronic signature Validity Model 1. Shell model Certificate 1 Certificate 2 Certificate 3 Signed document Generate valid signature validCheck invalidCheck.
______________________________________________________________________________________ Annual Meeting Blacksburg, Virginia April 2006 International.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
LECTURE – V e-COMMERCE İstanbul Commerce University Vocational School.
Electronic – Statutory Financial Return (E-SFR) Timae Flood Bermuda Monetary Authority.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.

TAG Presentation 18th May 2004 Paul Butler
Web Security.
Chapter 4 a - X.509 Authentication
Trust and Identification
VNF Package Integrity and Authenticity – Public key based
Authentication, Authorisation and Security
The ITU-T X.500 series and X.509 in a changing world
Date of download: 10/23/2017 Copyright © ASME. All rights reserved.
TAG Presentation 18th May 2004 Paul Butler
K E Y Plain text Cipher text Encryption Decryption
Digital Signatures A digital signature is a protocol that produces the same effect as a real signature: It is a mark that only the sender can make but.
Module 8: Securing Network Traffic by Using IPSec and Certificates
Adding Distributed Trust Management to Shibboleth
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
NAAS 2.0 Features and Enhancements
Technical Approach Chris Louden Enspier
Digital Certificates and X.509
Cryptographic Usage Mask
Pre-image Resistance: Given a, hard to find b such that ____
The Secure Sockets Layer (SSL) Protocol
Certificate Enrollment Process
Module 8: Securing Network Traffic by Using IPSec and Certificates
ROA Content Proposal November 2006 Geoff Huston.
PKI (Public Key Infrastructure)
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

Validation and Semantics of XML Digital Signatures Paul A. Lambert April 15, 1999 plambert@sprintmail.com

Overview Meaning Validation processing Key Usage Delegation Recommendations

What is the meaning of a Signature? I approve? I created? I read? I grant? Signature “meaning” is not part of the signed document! XML signatures must carry signature meaning separate from signed information

Validation Determine algorithms, signature formats, and key Hash appropriate data Use appropriate algorithms and key to create signature over hashed information Compare computed signature to attached signature Determine if the key was trusted for this usage is the key valid? Is it appropriate for this XML application?

Key Usage Validation: Usage must be tied to XML schema cryptographic is the key valid? is the key appropriate fo this application? Usage must be tied to XML schema Embed XML in X.509? Create XML protery authorization certificates!

Delegation and Authorization XML statements can delegate trust to determine key usage Trust management Assignment of rights to make statements in specific ranges. Grant rights for ranges of target and range of signature semantic property values

Signatures versus Authorization Signatures are statements of the form: “In {schema}, {key_holder} says {object}has {property}”. Authorization statements are of the form: “In {schema}, {key_holder-1} grants {key_holder-2} the rights to make statements in {object_range}{property_range}”.

Recommendations XML signatures should include signature semantics perhaps all XML signatures are a type of RDF statement XML signature specification must include complete description of validity processing Authorization should be supported perhaps a specifc type of RDF statement to grant property ranges to subject ranges

Contact Information Paul A. Lambert Certicom Corp. 25801 Industrial Blvd. Hayward, CA, 96565 +1-510-780-5400 plambert@sprintmail.com