A Two-Phase Local Server Security Model Based on XML Certificate

  • Yong-Hwa Kim
  • Jin-Sung Kim
  • Yong-Sung Kim
  • Jang-Sup Shim
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3984)


This paper proposes server security certificate management system applying the mechanism of public key infrastructure and XML Security technology specification to secure the information and resources open in network. This model is the system that permits the access only to the authorized users at a request of the status of the certificate through certifying server after issuing and requesting wire, wireless certificate on-line and registering on the XML certificate managing server. Also, this paper investigates the methods to support independent and various styles of information exchanges at platform using SOAP Message to provide remote server with the service of certificate request and inquiry.


Request Message Certificate Authority Reply Message Certificate Information Certificate Management 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Moon, K.-Y.: XML XML information protection abstract. KIPS journal 10(2), 108–116 (2003)Google Scholar
  2. 2.
    Lee, H.-s.: Design and Implementation of EC Server Security based on XML Digital Signature. In: Proceedings of the 29th KISS Spring Conference, pp. 760–792 (April 2002)Google Scholar
  3. 3.
    Kim, S.-Y.: Design and Implementation of e-commerce system Supporting XML Digital Signature. In: Proceedings of KISS Conference, vol. 28(2), pp. 766–768 (2001)Google Scholar
  4. 4.
    Lim, H.-Y.: Bundle Authentication using XML Signature in the OSGi Service Platform. In: Proceedings of the KISS Conference, vol. 31(1), pp. 196–198 (2004)Google Scholar
  5. 5.
    Lee, W.-J.: XML Signature Scheme with Time Stamping Protocol. In: Proceedings of the KISS Conference, vol. 31(1), pp. 214–216 (2004)Google Scholar
  6. 6.
    Bertino, E., Carminati, B., Ferrari, E.: XML security. Information Security Technical Report, 6(2), 44-58 (June 1, 2001)Google Scholar
  7. 7.
    Kim, Y.-D.: Extention of Kailar Accountability Logic for Symmetric Key Digital Signature and Accountability Analysis of an Electronic Payment Protocal. The Transactions of the KISS Processing Society 9(3), 3046–3059 (1999)Google Scholar
  8. 8.
  9. 9.
  10. 10.
    Blyth, A., Cunliffe, D., Sutherland, I.: Security analysis of XML usage and XML parsing. Computers & Security 22(6), 494–505 (2003)CrossRefGoogle Scholar
  11. 11.
    Bertino, E., Carminati, B., Ferrari, E.: XML security. Information Security Technical Report 6(2), 44–58 (2001)CrossRefGoogle Scholar
  12. 12.
    Komathy, K., Ramachandran, V., Vivekanandan, P.: Security for XML messaging services—a component-based approach. Journal of Network and Computer Applications 26(2), 197–211 (2003)Google Scholar
  13. 13.
    Gómez, A.F., Martínez, G., Cánovas, Ó.: New security services based on PKI. Future Generation Computer Systems 19(2), 251–262 (2003)CrossRefGoogle Scholar
  14. 14.
    Farrell, S., Zolotarev, M.: XML and PKI — What’s the story? Network Security 2001(9), 7–10 (2001)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Yong-Hwa Kim
    • 1
  • Jin-Sung Kim
    • 1
  • Yong-Sung Kim
    • 1
  • Jang-Sup Shim
    • 2
  1. 1.Division of Electronic and Information EngineeringChonbuk National UniversityJeonjuRepublic of Korea
  2. 2.Institute of Information Technology AssessmentDaejeon-siRepublic of Korea

Personalised recommendations