{"created":"2020-09-01T13:24:51.932431+00:00","id":3734,"links":{},"metadata":{"_buckets":{"deposit":"5f18c160-410a-4fc7-8fe4-ffee3fc42e07"},"_deposit":{"id":"3734","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3734"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3734","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Information Security for Secret Data Transmission over Web Services","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Information hiding technique is becoming aresearch hotspot in information security, and will bewidely used to national security, e-commerce, egovernment,copyright protection and covertcommunication. This paper proposes secure, efficientcapacity and undetectable hiding algorithm to be usedfor XML document and the secret message is hiddenin cover XML according to the pseudorandom numbergenerator which makes this system more secured. Theproposed steganography algorithm, which is differentfrom all steganographic algorithms in XML and textfile that uses XOR logical operation and mathematicaloperation to hide secret data. All other algorithmswhich hide information by inserting white space inXML tag, rearranging the order of XML elements etc.This paper also developed a secure system in whichcryptography and steganography are used asintegrated part along with newly developed enhancedsecurity model for web services. In Steganography thesecret message is hidden in (Simple Object AccessProtocol) SOAP message according to the proposedhiding algorithm. In Cryptography public key (RSA)algorithm is used to encrypt the key for extractingprocess. This technique is empirically validated toindicate its utility and value."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-03"}],"displaytype":"preview","filename":"12053.pdf","filesize":[{"value":"447 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3734/files/12053.pdf"},"version_id":"48512b79-57ab-4a39-ac49-8b558d3e229d"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Twelfth International Conference On Computer Applications (ICCA 2014)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Tin, Lwin Mar"},{"subitem_authors_fullname":"Kham, Nang Saing Moon"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2014-02-17"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/147"},"item_title":"Information Security for Secret Data Transmission over Web Services","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-03","publish_status":"0","recid":"3734","relation_version_is_last":true,"title":["Information Security for Secret Data Transmission over Web Services"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T01:04:24.668652+00:00"}