{"id":"https://openalex.org/W2153776125","doi":"https://doi.org/10.1109/hicss.2003.1174279","title":"XML security using XSLT","display_name":"XML security using XSLT","publication_year":2003,"publication_date":"2003-01-01","ids":{"openalex":"https://openalex.org/W2153776125","doi":"https://doi.org/10.1109/hicss.2003.1174279","mag":"2153776125"},"language":"en","primary_location":{"id":"doi:10.1109/hicss.2003.1174279","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hicss.2003.1174279","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064418327","display_name":"R.G. Bartlett","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"R.G. Bartlett","raw_affiliation_strings":["Centre for Advanced Systems Engineering, University of Western Ontario, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Advanced Systems Engineering, University of Western Ontario, Australia","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037182994","display_name":"M.W. Cook","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"M.W. Cook","raw_affiliation_strings":["Centre for Advanced Systems Engineering, University of Western Ontario, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Advanced Systems Engineering, University of Western Ontario, Australia","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5064418327"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.9443,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.8174594,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"6 pp.","last_page":"6 pp."},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10317","display_name":"Advanced Database Systems and Queries","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10317","display_name":"Advanced Database Systems and Queries","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10215","display_name":"Semantic Web and Ontologies","score":0.9864000082015991,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/xslt","display_name":"XSLT","score":0.9045021533966064},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.850942850112915},{"id":"https://openalex.org/keywords/xml","display_name":"XML","score":0.6413885951042175},{"id":"https://openalex.org/keywords/streaming-xml","display_name":"Streaming XML","score":0.5721838474273682},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.5023188591003418},{"id":"https://openalex.org/keywords/style-sheet","display_name":"Style sheet","score":0.4930560290813446},{"id":"https://openalex.org/keywords/xml-database","display_name":"XML database","score":0.4561939835548401},{"id":"https://openalex.org/keywords/xml-framework","display_name":"XML framework","score":0.43325257301330566},{"id":"https://openalex.org/keywords/simple-api-for-xml","display_name":"Simple API for XML","score":0.4232710897922516},{"id":"https://openalex.org/keywords/document-structure-description","display_name":"Document Structure Description","score":0.41702547669410706},{"id":"https://openalex.org/keywords/xml-encryption","display_name":"XML Encryption","score":0.41311734914779663},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.33670327067375183},{"id":"https://openalex.org/keywords/xml-signature","display_name":"XML Signature","score":0.32546883821487427},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.20152440667152405}],"concepts":[{"id":"https://openalex.org/C150569060","wikidata":"https://www.wikidata.org/wiki/Q32110","display_name":"XSLT","level":3,"score":0.9045021533966064},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.850942850112915},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.6413885951042175},{"id":"https://openalex.org/C44883583","wikidata":"https://www.wikidata.org/wiki/Q7622687","display_name":"Streaming XML","level":3,"score":0.5721838474273682},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.5023188591003418},{"id":"https://openalex.org/C89159866","wikidata":"https://www.wikidata.org/wiki/Q4119753","display_name":"Style sheet","level":3,"score":0.4930560290813446},{"id":"https://openalex.org/C183068750","wikidata":"https://www.wikidata.org/wiki/Q357393","display_name":"XML database","level":3,"score":0.4561939835548401},{"id":"https://openalex.org/C21761406","wikidata":"https://www.wikidata.org/wiki/Q8042330","display_name":"XML framework","level":3,"score":0.43325257301330566},{"id":"https://openalex.org/C8595896","wikidata":"https://www.wikidata.org/wiki/Q577094","display_name":"Simple API for XML","level":5,"score":0.4232710897922516},{"id":"https://openalex.org/C68699486","wikidata":"https://www.wikidata.org/wiki/Q265904","display_name":"Document Structure Description","level":3,"score":0.41702547669410706},{"id":"https://openalex.org/C173242113","wikidata":"https://www.wikidata.org/wiki/Q607488","display_name":"XML Encryption","level":4,"score":0.41311734914779663},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.33670327067375183},{"id":"https://openalex.org/C34330436","wikidata":"https://www.wikidata.org/wiki/Q979532","display_name":"XML Signature","level":4,"score":0.32546883821487427},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.20152440667152405}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hicss.2003.1174279","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hicss.2003.1174279","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W13024833","https://openalex.org/W1500174841","https://openalex.org/W1965014786","https://openalex.org/W2123056245","https://openalex.org/W2154546836"],"related_works":["https://openalex.org/W4236111682","https://openalex.org/W2461814135","https://openalex.org/W4233699405","https://openalex.org/W2611590248","https://openalex.org/W2172148121","https://openalex.org/W1919771232","https://openalex.org/W2354363460","https://openalex.org/W1483711868","https://openalex.org/W2354994114","https://openalex.org/W134554114"],"abstract_inverted_index":{"The":[0],"eXtensible":[1,67],"Markup":[2],"Language":[3,69],"(XML)":[4],"is":[5,28,53,65,152],"regarded":[6],"generally":[7],"as":[8,14],"having":[9],"promise":[10],"of":[11,22,29,41,57,92,137,166],"becoming":[12],"established":[13],"the":[15,55,66,145,157],"general":[16],"purpose":[17],"framework":[18],"for":[19,54,113],"enabling":[20],"transfer":[21,117,125],"data":[23],"amongst":[24],"heterogeneous":[25],"environments.":[26],"It":[27],"interest":[30],"therefore":[31],"to":[32,81,87,143],"analyse":[33],"how":[34],"suitable":[35],"it":[36],"may":[37,76],"be":[38,131,141],"once":[39],"details":[40],"applications":[42],"requirements":[43,108],"and":[44,133,160],"constraints":[45],"are":[46,109],"taken":[47],"into":[48,127],"account.":[49],"One":[50],"important":[51],"requirement":[52],"security":[56,107],"documents":[58],"in":[59,156],"transit.":[60],"Closely":[61],"associated":[62],"with":[63],"XML":[64,104],"Stylesheet":[68],"(XSL),":[70],"whose":[71,106],"document":[72,93,116,124],"transformation":[73],"component":[74],"(XSLT)":[75],"well":[77],"have":[78],"sufficient":[79],"functionality":[80],"perform":[82],"all":[83],"reasonable":[84],"cryptographic":[85],"transformations":[86],"deliver":[88],"a":[89,101,114,123],"desired":[90],"level":[91],"security.":[94],"We":[95,148],"examine":[96],"this":[97],"question":[98],"by":[99,163],"describing":[100],"real":[102],"world":[103],"application":[105,146],"more":[110],"complex":[111],"than":[112],"simple":[115],"between":[118],"just":[119,154],"two":[120],"parties;":[121],"proposing":[122],"architecture":[126],"which":[128,139],"XSLT":[129,138,151],"can":[130],"plugged-in;":[132],"identifying":[134],"those":[135],"features":[136],"must":[140],"applied":[142],"meet":[144],"requirements.":[147],"conclude":[149],"that":[150],"only":[153,162],"adequate":[155],"proposed":[158],"scenario;":[159],"then":[161],"making":[164],"use":[165],"its":[167],"\"":[168,171],"extension":[169],"functions":[170],"capability.":[172]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
