The Community for Technology Leaders
2011 IEEE International Conference on Web Services (2011)
Washington, DC USA
July 4, 2011 to July 9, 2011
ISBN: 978-0-7695-4463-2
pp: 65-72
In composite web services one can only either hide the identities of the participants or provide end-to-end confidentiality via encryption. For a designer of inter-organizational business processes this implies that she either needs to reveal her suppliers or force her customers to reveal their information. In this paper we present a solution to the encrypted data modification problem and recon ciliate this apparent conflict. Using a generic sender-transformer-recipient example scenario, we illustrate the steps required for applying XML transformations to encrypted data, present the cryptographic building blocks, and give an outlook on advantages and weaknesses of the proposed encryption scheme. The transformer is then able to offer composite services without itself learning the content of the messages.
XML transformation, encrypted data modification problem, homomorphic encryption

F. Kerschbaum and M. Jensen, "Towards Privacy-Preserving XML Transformation," 2011 IEEE International Conference on Web Services(ICWS), Washington, DC USA, 2011, pp. 65-72.
95 ms
(Ver 3.3 (11022016))