The book is focused on the analysis and design of a
novel software architecture with the purpose of
supporting distributed user and document management.
Particular attention is dedicated to the outsourcing
of sensitive semi-structured document data to
untrustworthy database servers and related security
concerns. Current standardization efforts in the
field of Web service security serve as starting point
for the development of core security components with
special focus on sensitive data encryption, key
management and authorization of user requests.
Real world application settings are identified,
whereas main selection criteria comprise the
applicability of multi-user systems and a high demand
for security mechanisms for managing sensitive data
sets. Results are demonstrated and tested by
prototypical reference implementations. The closing
specification of the developed interfaces provides
means for future integration of the security services
with existing application systems.
novel software architecture with the purpose of
supporting distributed user and document management.
Particular attention is dedicated to the outsourcing
of sensitive semi-structured document data to
untrustworthy database servers and related security
concerns. Current standardization efforts in the
field of Web service security serve as starting point
for the development of core security components with
special focus on sensitive data encryption, key
management and authorization of user requests.
Real world application settings are identified,
whereas main selection criteria comprise the
applicability of multi-user systems and a high demand
for security mechanisms for managing sensitive data
sets. Results are demonstrated and tested by
prototypical reference implementations. The closing
specification of the developed interfaces provides
means for future integration of the security services
with existing application systems.