SlideShare a Scribd company logo
XML Security Using XSLT
Table of Contents
 ž  Introduction
 ž  XML (eXtensible Markup Language)
 ž  XML Security
       —  Element wise Encryption
       —  Access Control Model
 ž  XSLT (eXtensible Stylesheet Language Transformations)
 ž  XML Security using XSLT
 ž  Conclusion
 ž  References
Introduction
ž    XML (eXtensible Markup Language) - the
      “love child” of W3C (World Wide Web
      Consortium)
ž    XML - Mainly used for B2B messaging




ž    Biggest concern for customer is security
Introduction (contd.)
ž    XML inherits transport layer security such
      as SSL as used in HTML for basic security
ž    Some security features of XML are beyond
      transport layer security
ž    This project addresses the specific security
      features of XML by
      —  Describing an access control model &
      —  Performing cryptographic transformations on it
Introduction (contd.)
ž    XSLT (eXtensible Stylesheet Language
      Transformations)
ž    XSLT may well have sufficient functionality
      to perform all reasonable cryptographic
      transformations.
ž    We extend the XSLT Processor to provide
      encryption and decryption functions
ž    We also implement a real world application
      in PHP, utilizing the cryptographic functions
      in the XSLT processor
XML
ž  XML  is open standard for cross
  application communication

ž  XMLallows users to structure and label
  information separately from the
  presentation of that information.

ž  An XML document must adhere to
  particular syntax and semantics as
  outlined in XML Specification by W3C
XML (contd.)
ž    XML is generally parsed or manipulated
      using Document Object Model (DOM)
ž    DOM allows navigation of an XML
      document as if it were a tree with node
      objects as branches

 <payment type=card”>
     <issuer>    Card Company A              </issuer>
     <cardinfo>
         <name>        ADAM ISHMAEL          </name>
         <expiration> 04/2010                </expiration>
         <number>      5283 8304 6232 0010   </number>
     </cardinfo>
 </payment>
XML Security
ž    XML uses existing Transport Layer Security
      (TLS) mechanism such as SSL for basic end
      to end communication security

ž    TLS prevents eavesdropping, tampering, and
      message forgery between a client and server

ž    TLS doesn’t address some specific XML
      Security features such as:
      —  Element Wise Encryption
      —  Digital Signature and
      —  Access Control
Element Wise Encryption
ž  Element-wise encryption allows the user
  to select the data fields to be encrypted

ž  Therefore,the remaining nonconfidential
  data fields will be readable.

ž  Instead of the encrypting an entire
  document, it is enough to encrypt only a
  part of it which should be confidential.
Element Wise Encryption (contd.)
ž    An Example:
 <payment type=card”>
     <issuer>Card Company A</issuer>
     <cardinfo>
         <name>        ADAM ISHMAEL          </name>
         <expiration> 04/2010                </expiration>
         <number>      5283 8304 6232 0010   </number>
     </cardinfo>
 </payment>

ž    Card Info Encrypted
 <payment type=card”>
     <issuer>Card Company A</issuer>
     <EncryptedElement contentType=”text/plain”
     algorithm=”DES” encoding=”base64”>
         PHJvdz4KICAglCAgPGNvbCBwYWNrZWQ9lmJhc2U2NCl+
     </EncryptedElement>
 </payment>
XML Access Control Model
ž  Providing
            the right people with the right
  access to information is as important as
  having the information in the first place

ž  XMLAccess Control is performed by
  providing XML documents with a
  sophisticated access control model by
  applying appropriate encryption /
  decryption transformation
XML Access Control Model
XSLT
ž    XSLT (eXtensible Stylesheet
      Language Transformations) is a
      W3C specification for a document
      manipulation language capable of
      restructuring documents and
      performing computations on their
      elements.
XML Security using XSLT
ž    If we regard encryption/decryption as just
      another XML document transformation
      operation, then it is apparent that the
      advantages XSLT

ž    We propose a model to implement the
      various XML security features using XSLT
      thus making it possible for a standard XSLT
      processor to provide XML security
      functions.
XML Security using XSLT
Conclusion
ž    XSLT processors remain as a standard
      specification in the client side, the server side and
      can be implemented anywhere in a business
      application
ž    Our proposal thus makes encryption / decryption
      of an XML Document possible just by using a XSL
      encrypting / decrypting document
ž    The project thus extends the XSLT processor to
      provide encryption and decryption functions and
      implement an Access Control Model
ž    For demonstration of the cryptographic capabilities
      implemented using XSLT processor, a real world
      application is developed using PHP
References
ž    Kayvan Farzaneh; Mahmood Doroodchi, "XML Security
      beyond XSLT," Innovations in Information Technology, 2006 ,
      pp.1-5, Nov. 2006


ž    Maruyama H. and Imamura T., “Element-Wise XML
      Encryption”, April 2000.

ž    W3C, “Extensible Markup Language (XML) 1.0 (Fifth Edition)
      W3C Recommendation 26 November 2008”


ž    W3C, “XSL Transformations (XSLT) Version 2.0 W3C
      Recommendation 23 January 2007”
Thank You…
ž    Read the research whitepaper here:
      Slideshare.net

ž    Like this presentation? Share it...

ž    Questions? Tweet me @ahmedmzl

ž    This presentation was presented at the National
      Conference on Computational Intelligence and
      Network Security, April 2009

More Related Content

What's hot (19)

PPTX
Chapter 18
application developer
 
DOC
Xslt
prathap kumar
 
PPTX
XML
eewiley
 
DOC
Xpath
xavier john
 
PPTX
Introductionto xslt
Kumar
 
PDF
treeview
tutorialsruby
 
PPT
Xpath
Manav Prasad
 
PDF
What is the world wide web how does it work.docx
Training For Skills And Knowledge
 
PPTX
Xml PPT
Jasbeer Chauhan
 
PDF
light_xml
Jennifer Power
 
PDF
E05412327
IOSR-JEN
 
PDF
Building XML Based Applications
Prabu U
 
PPT
What is xml
Aneesa Rahman
 
PPT
Lecture 2 - Using XML for Many Purposes
phanleson
 
PPT
XSLT Formats in Website Templates in Cascade Server CMS by Jay Mercer
hannonhill
 
PPTX
XPath Introduction
Stuart Myles
 
PPT
Xml iet 2015
kiransurariya
 
PPT
Session 4
Lại Đức Chung
 
XML
eewiley
 
Introductionto xslt
Kumar
 
treeview
tutorialsruby
 
What is the world wide web how does it work.docx
Training For Skills And Knowledge
 
light_xml
Jennifer Power
 
E05412327
IOSR-JEN
 
Building XML Based Applications
Prabu U
 
What is xml
Aneesa Rahman
 
Lecture 2 - Using XML for Many Purposes
phanleson
 
XSLT Formats in Website Templates in Cascade Server CMS by Jay Mercer
hannonhill
 
XPath Introduction
Stuart Myles
 
Xml iet 2015
kiransurariya
 

Similar to XML Security Using XSLT (20)

PDF
Element wise encryption of XML using XSLT
Ahmed Muzammil
 
PPTX
SOA Security
Pauli Kauppila
 
PPTX
Information Security Engineering
Md. Hasan Basri (Angel)
 
PPT
Websphere - About Websphere ssl part ii
Vibrant Technologies & Computers
 
PPT
Websphere - Introduction to ssl part ii
Vibrant Technologies & Computers
 
PDF
Attacking XML Security
Yusuf Motiwala
 
PPTX
XML Encryption
Prabath Siriwardena
 
PDF
Designing a logical security framework
ijsc
 
PDF
Designing A Logical Security Framework for E-Commerce System Based on SOA
ijsc
 
PDF
xml test
kunalboss
 
PDF
test slideshare
kunalboss
 
PDF
A Validation Model of Data Input for Web Services
Rafael Brinhosa
 
PPT
Web services Overview in depth
AbdulImrankhan7
 
PPTX
On Technical Security Issues in Cloud Computing.pptx
GaluhPt
 
PPT
Intro toxml
sudhakar mandal
 
PPT
Xml description
sonam gupta
 
Element wise encryption of XML using XSLT
Ahmed Muzammil
 
SOA Security
Pauli Kauppila
 
Information Security Engineering
Md. Hasan Basri (Angel)
 
Websphere - About Websphere ssl part ii
Vibrant Technologies & Computers
 
Websphere - Introduction to ssl part ii
Vibrant Technologies & Computers
 
Attacking XML Security
Yusuf Motiwala
 
XML Encryption
Prabath Siriwardena
 
Designing a logical security framework
ijsc
 
Designing A Logical Security Framework for E-Commerce System Based on SOA
ijsc
 
xml test
kunalboss
 
test slideshare
kunalboss
 
A Validation Model of Data Input for Web Services
Rafael Brinhosa
 
Web services Overview in depth
AbdulImrankhan7
 
On Technical Security Issues in Cloud Computing.pptx
GaluhPt
 
Intro toxml
sudhakar mandal
 
Xml description
sonam gupta
 
Ad

More from Ahmed Muzammil (7)

PPTX
Islam on respecting others
Ahmed Muzammil
 
PDF
Children upbringing in Islam, Tiger and Panda Parenting
Ahmed Muzammil
 
PDF
What Islam Teaches You About Healthy Food - Healthy Foods and Myths
Ahmed Muzammil
 
PDF
Jaspersoft Reporting v5
Ahmed Muzammil
 
PDF
Virus detection based on virus throttle technology
Ahmed Muzammil
 
PDF
Virus detection based on virus throttle technology
Ahmed Muzammil
 
PDF
An Introduction to JSON JavaScript Object Notation
Ahmed Muzammil
 
Islam on respecting others
Ahmed Muzammil
 
Children upbringing in Islam, Tiger and Panda Parenting
Ahmed Muzammil
 
What Islam Teaches You About Healthy Food - Healthy Foods and Myths
Ahmed Muzammil
 
Jaspersoft Reporting v5
Ahmed Muzammil
 
Virus detection based on virus throttle technology
Ahmed Muzammil
 
Virus detection based on virus throttle technology
Ahmed Muzammil
 
An Introduction to JSON JavaScript Object Notation
Ahmed Muzammil
 
Ad

Recently uploaded (20)

PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PDF
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PDF
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PDF
July Patch Tuesday
Ivanti
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PDF
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
July Patch Tuesday
Ivanti
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 

XML Security Using XSLT

  • 2. Table of Contents ž  Introduction ž  XML (eXtensible Markup Language) ž  XML Security —  Element wise Encryption —  Access Control Model ž  XSLT (eXtensible Stylesheet Language Transformations) ž  XML Security using XSLT ž  Conclusion ž  References
  • 3. Introduction ž  XML (eXtensible Markup Language) - the “love child” of W3C (World Wide Web Consortium) ž  XML - Mainly used for B2B messaging ž  Biggest concern for customer is security
  • 4. Introduction (contd.) ž  XML inherits transport layer security such as SSL as used in HTML for basic security ž  Some security features of XML are beyond transport layer security ž  This project addresses the specific security features of XML by —  Describing an access control model & —  Performing cryptographic transformations on it
  • 5. Introduction (contd.) ž  XSLT (eXtensible Stylesheet Language Transformations) ž  XSLT may well have sufficient functionality to perform all reasonable cryptographic transformations. ž  We extend the XSLT Processor to provide encryption and decryption functions ž  We also implement a real world application in PHP, utilizing the cryptographic functions in the XSLT processor
  • 6. XML ž  XML is open standard for cross application communication ž  XMLallows users to structure and label information separately from the presentation of that information. ž  An XML document must adhere to particular syntax and semantics as outlined in XML Specification by W3C
  • 7. XML (contd.) ž  XML is generally parsed or manipulated using Document Object Model (DOM) ž  DOM allows navigation of an XML document as if it were a tree with node objects as branches <payment type=card”> <issuer> Card Company A </issuer> <cardinfo> <name> ADAM ISHMAEL </name> <expiration> 04/2010 </expiration> <number> 5283 8304 6232 0010 </number> </cardinfo> </payment>
  • 8. XML Security ž  XML uses existing Transport Layer Security (TLS) mechanism such as SSL for basic end to end communication security ž  TLS prevents eavesdropping, tampering, and message forgery between a client and server ž  TLS doesn’t address some specific XML Security features such as: —  Element Wise Encryption —  Digital Signature and —  Access Control
  • 9. Element Wise Encryption ž  Element-wise encryption allows the user to select the data fields to be encrypted ž  Therefore,the remaining nonconfidential data fields will be readable. ž  Instead of the encrypting an entire document, it is enough to encrypt only a part of it which should be confidential.
  • 10. Element Wise Encryption (contd.) ž  An Example: <payment type=card”> <issuer>Card Company A</issuer> <cardinfo> <name> ADAM ISHMAEL </name> <expiration> 04/2010 </expiration> <number> 5283 8304 6232 0010 </number> </cardinfo> </payment> ž  Card Info Encrypted <payment type=card”> <issuer>Card Company A</issuer> <EncryptedElement contentType=”text/plain” algorithm=”DES” encoding=”base64”> PHJvdz4KICAglCAgPGNvbCBwYWNrZWQ9lmJhc2U2NCl+ </EncryptedElement> </payment>
  • 11. XML Access Control Model ž  Providing the right people with the right access to information is as important as having the information in the first place ž  XMLAccess Control is performed by providing XML documents with a sophisticated access control model by applying appropriate encryption / decryption transformation
  • 13. XSLT ž  XSLT (eXtensible Stylesheet Language Transformations) is a W3C specification for a document manipulation language capable of restructuring documents and performing computations on their elements.
  • 14. XML Security using XSLT ž  If we regard encryption/decryption as just another XML document transformation operation, then it is apparent that the advantages XSLT ž  We propose a model to implement the various XML security features using XSLT thus making it possible for a standard XSLT processor to provide XML security functions.
  • 16. Conclusion ž  XSLT processors remain as a standard specification in the client side, the server side and can be implemented anywhere in a business application ž  Our proposal thus makes encryption / decryption of an XML Document possible just by using a XSL encrypting / decrypting document ž  The project thus extends the XSLT processor to provide encryption and decryption functions and implement an Access Control Model ž  For demonstration of the cryptographic capabilities implemented using XSLT processor, a real world application is developed using PHP
  • 17. References ž  Kayvan Farzaneh; Mahmood Doroodchi, "XML Security beyond XSLT," Innovations in Information Technology, 2006 , pp.1-5, Nov. 2006 ž  Maruyama H. and Imamura T., “Element-Wise XML Encryption”, April 2000. ž  W3C, “Extensible Markup Language (XML) 1.0 (Fifth Edition) W3C Recommendation 26 November 2008” ž  W3C, “XSL Transformations (XSLT) Version 2.0 W3C Recommendation 23 January 2007”
  • 18. Thank You… ž  Read the research whitepaper here: Slideshare.net ž  Like this presentation? Share it... ž  Questions? Tweet me @ahmedmzl ž  This presentation was presented at the National Conference on Computational Intelligence and Network Security, April 2009