Ed Simon, Entrust Technologies
Lafayette, California 2000 November 2
1. XML Encryption: Applications & Proposal Overview
2. XML Encryption: Applications
3. XML Encryption Application:Wireless online banking
4. XML Encryption Application: Wireless online banking...
5. XML Encryption Application: Buyer-vendor-bank transaction
6. XML Encryption Application: Buyer-vendor-bank transaction...
7. XML Security Application: Fine-Grained Access Control
8. XML Security Application: Fine-Grained Access Control...
9. XML Security Application: Fine-Grained Access Control...
10. XML Security Application: Fine-Grained Access Control...
11. XML Encryption: Proposal Overview
12. Introduction
14. The <EncryptedData> element: Non-attribute XML nodes
15. Processing rules: Encrypting non-attribute nodes
16. Processing rules: Decrypting non-attribute nodes
17. The <EncryptedData> element:XML Attribute nodes
18. Processing rules: Encrypting attribute values
19. Processing rules: Decrypting attribute vales
20. The <EncryptedData> element:Attribute values...
21. The <EncryptedData> element: Arbitrary data
22. A closer look at <EncryptedData>
23. The <DecryptionInfo> element
24. The <DecryptionInfo> element...
25. XML Encryption and XML Signature
27. XmlEncryptor: A proof-of-concept demo
28. XmlEncryptor: General comments
30. Addendum: PWC Questions...
31. Addendum: PWC Questions...
32. Addendum: PWC Questions...
33. XML Encryption:Contact info
Slide 1 of 33
Slide 2 of 33
Slide 3 of 33
Slide 4 of 33
Slide 5 of 33
Slide 6 of 33
Slide 7 of 33
Slide 8 of 33
Slide 9 of 33
Slide 10 of 33
Slide 11 of 33
Slide 12 of 33
Slide 13 of 33
Slide 14 of 33
Slide 15 of 33
Slide 16 of 33
Slide 17 of 33
Slide 18 of 33
Slide 19 of 33
Slide 20 of 33
Slide 21 of 33
Slide 22 of 33
Slide 23 of 33
Slide 24 of 33
Slide 25 of 33
Slide 26 of 33
Slide 27 of 33
Slide 28 of 33
Slide 29 of 33
Slide 30 of 33
Slide 31 of 33
Slide 32 of 33
Slide 33 of 33