Welcome!

Joseph Smith

Subscribe to Joseph Smith: eMailAlertsEmail Alerts
Get Joseph Smith via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Joseph Smith

Ever since the Java Card 1.0 was introduced in 1996 it has been gradually maturing, and recently celebrated its fifth anniversary. American Express, Visa, and now the Department of Defense have all deployed solutions that utilize the Java Card specifications. This rather large movement proves that Java Card technology is a great system for data security and data mobility. At last count, American Express claimed over 4 million deployed cards and Visa estimated over 7 million at the end of last year. Since September 11, 2001, there has been a lot of interest regarding Java-based smart cards combined with biometrics (verifying the identity of a person through some physical characteristic). This has driven the Java Card specifications to the forefront, and more and more engineers (and managers) are scrambling to implement them. Currently, Java Card implementers use Jav... (more)

Using the IBM XML Security Suite

With Web services moving to the forefront at a very rapid pace, components will share their data. SOAP, an XML derivative, will be used to exchange data between the services, and XML is the glue that will hold the e-commerce and Web-based solutions together. That powerful glue, however, presents a problem: security. Purchasing, payment, and even banking will perform functions easily over the Internet using XML. But the XML document needs to be secured just like any other data. This two-part series examines two ways to deal with XML security: encryption and, in Part 2, signatures... (more)

Using the IBM XML Security Suite

Last month I revealed a way to implement security for your XML documents. The advantages of adding security to XML documents were discussed as well as the World Wide Web Consortium working drafts that cover XML encryption. We explored how to use the IBM XML Security Suite toolkit to encrypt XML documents - how to do a simple encryption of an XML document and then decrypt the same document. The toolkit uses standards that are in working draft form from the W3C. To perform XML signatures, I'll use the same tools I used before, but to make things interesting I'm going to switch to t... (more)