SlideShare a Scribd company logo
1 of 84
XML Signature
Prabath Siriwardena
Director, Security Architecture
XML Security
• Integrity and non-repudiation
 XML Signature by W3C
 http://www.w3.org/TR/xmldsig-core/
• Confidentiality of XML documents
 XML Encryption by W3C
 http://www.w3.org/TR/xmlenc-core/
XML-Signature
• A joint standard by IETF and W3C for digitally
signing all of an XML document, part of an XML
document or even an external object.
• XML Signature applies to any resource
addressable by an URI – including non-xml
content.
• First security standard to reach recommendation
status
• WS-Security, XKMS, SAML all depend on XML
Signature
XML-Signature
• Multiple XML Signatures can be able to exist
over the static content of a web resource.
XML-Signature
<Signature
xmlns=“…../2000/09/xmldsig#”>
<SignedInfo />
<SignatureValue />
<KeyInfo />
<Object />
</Signature>
QUESTION 1

What do we actually sign with an XML Signature
?
XML-Signature - Types

–
–
–

Enveloping Signature
Enveloped Signature
Detached Signature
XML-Signature - Enveloping
- Wraps item that is being signed within the
<Signature> element
- <Reference> element points to an element
within the <Signature> element

Signature
XML-Signature - Enveloping
<Signature>
<SignedInfo>
<Reference URI=“#101” />
</SignedInfo>
<SignatureValue>…. </SignatureValue>
<KeyInfo>…. </KeyInfo>
<Object>
<SignedItem id=“101”>
……..
</SignedItem>
</Object>
<Signature>

Signature
XML-Signature - Enveloping
<ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
<ds:SignedInfo>
<ds:CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315"></ds:CanonicalizationMethod>
<ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#dsa-sha1"></ds:SignatureMethod>
<ds:Reference URI="#TheFirstObject">
<ds:Transforms>
<ds:Transform Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315#WithComments"></ds:Transform>
</ds:Transforms>
<ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"></ds:DigestMethod>
<ds:DigestValue>ipbs0UyafkdRIcfIo9zyZLce+CE=</ds:DigestValue>
</ds:Reference>
</ds:SignedInfo>
<ds:SignatureValue>BSChZzMdH1kHVbKL+EyNorZXcEZ9ekL+cf/VW8ejhItfZoXOZQVNnw==</ds:SignatureValue>
<ds:KeyInfo> ... </ds:KeyInfo>
<ds:Object Id="TheFirstObject">
<InsideObject>A text in a box</InsideObject>
</ds:Object>
</ds:Signature>

Signature
XML-Signature - Enveloped
- <Reference> element points to a parent
element outside the <Signature> element

Signature

Signed XML Content
XML-Signature - Enveloped
<SignedItem id=“101”>
<SignedElement1>Text</SignedElement1>
<Signature>
<SignedInfo>
<Reference URI=“#101” />
</SignedInfo>
<SignatureValue>…. </SignatureValue>
<KeyInfo>…. </KeyInfo>
<Signature>
</SignedItem>

Signature
XML-Signature - Enveloped
<apache:RootElement xmlns:apache="http://www.apache.org/ns/#app1" xmlns:foo="http://example.org/#foo">Some simple text
<Signature xmlns="http://www.w3.org/2000/09/xmldsig#">
<SignedInfo>
<CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315"></CanonicalizationMethod>
<SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#dsa-sha1"></SignatureMethod>
<Reference URI="">
<Transforms>
<Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"></Transform>
<Transform Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315#WithComments"></Transform>
</Transforms>
<DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"></DigestMethod>
<DigestValue>f+pDsT3LzyKV9Sg6rdK5bBrQlbo=</DigestValue>
</Reference>
</SignedInfo>
<SignatureValue>QNoLqAc0KYDmomJA3LvXhCf6vpuN/wh9R4y42QylvJCko9gRDhpHAA==</SignatureValue>
<KeyInfo>...</KeyInfo>
</Signature>
</apache:RootElement>

Signature
XML-Signature - Detached
- Points to an XML element or binary file out
side the <Signature> elements hierarchy
- <Reference> element points neither a child nor
a parent
- Can point to an element within the same
document or to another resource completely
outside the current XML document.

Signature
XML-Signature - Detached
Signature

Signed XML Content
QUESTION 2

Which signature type is used in WS-Security?
QUESTION 3

Provide a practical example for enveloped
signature ? And why it’s needed there ?
XML-Signature
<Signature
xmlns=“…../2000/09/xmldsig#”>
<SignedInfo />
<SignatureValue />
<KeyInfo />
<Object />
</Signature>
XML-Signature - <SignedInfo />
<SignedInfo>
<CanonicalizationMethod />
<SignatureMethod />
<Reference URI >
<Transforms />
<DigestMethd />
<DigestValue />
</Reference>
</SignedInfo>
XML-Signature - <SignedInfo />
<SignedInfo>
<CanonicalizationMethod />
<SignatureMethod />
<Reference URI >
<Transforms />
<DigestMethd />
<DigestValue />
</Reference>
</SignedInfo>
<CanonicalizationMethod />
XML syntax permits a number of options
(e.g., which form of empty elements to
use, whether to use single or double quotes for
attribute values, the order of attributes in a start
tag, places where white space is considered
insignificant, etc.), it is quite easy to create
documents that are physically different and yet
logically equivalent.
<CanonicalizationMethod />
The purpose of Canonical XML is to define an
algorithm by which a particular physical
representation of an XML document can be
reliably and repeatedly reduced to its canonical
(simplest) form. When the same algorithm is
applied to physically different representations to
produce their canonical forms, documents can be
compared at this logical level.
<CanonicalizationMethod />

• Canonical XML (or Inclusive XML
Canonicalization)(XMLC14N)
• Exclusive XML Canonicalization(EXCC14N)
<CanonicalizationMethod />
The Canonical XML is used for XML where
the context doesn't change while the
Exclusive XML was designed for
canonicalization where the context might
change.
XML-Signature (Example)
<apache:RootElement xmlns:apache="http://www.apache.org/ns/#app1" xmlns:foo="http://example.org/#foo">Some simple text
<Signature xmlns="http://www.w3.org/2000/09/xmldsig#">
<SignedInfo>
<CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315"></CanonicalizationMethod>
<SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#dsa-sha1"></SignatureMethod>
<Reference URI="">
<Transforms>
<Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"></Transform>
<Transform Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315#WithComments"></Transform>
</Transforms>
<DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"></DigestMethod>
<DigestValue>f+pDsT3LzyKV9Sg6rdK5bBrQlbo=</DigestValue>
</Reference>
</SignedInfo>
<SignatureValue>QNoLqAc0KYDmomJA3LvXhCf6vpuN/wh9R4y42QylvJCko9gRDhpHAA==</SignatureValue>
<KeyInfo>...</KeyInfo>
</Signature>
</apache:RootElement>

Signature
QUESTION 4

How about JSON ? Can there be multiple
physical representations of the same logical
JSON document ?
QUESTION 5

What are the differences between Inclusive
Canonicalization and Exclusive Canonicalization.
XML-Signature - <SignedInfo />
<SignedInfo>
<CanonicalizationMethod />
<SignatureMethod />
<Reference URI >
<Transforms />
<DigestMethd />
<DigestValue />
</Reference>
</SignedInfo>
<SignatureMethod />
The SignatureMethod is the algorithm that is
used to convert the canonicalized SignedInfo
into the SignatureValue.
<SignatureMethod />
- http://www.w3.org/2000/09/xmldsig#dsa-sha1
- http://www.w3.org/2000/09/xmldsig#rsa-sha1
- http://www.w3.org/2000/09/xmldsig#hmacsha1
QUESTION 6

What are the differences between RSA and DSA
?
QUESTION 7

Would HMAC-SHA1 provide both the integrity of
a message and the non-repudiation ?
XML-Signature (Example)
<apache:RootElement xmlns:apache="http://www.apache.org/ns/#app1" xmlns:foo="http://example.org/#foo">Some simple text
<Signature xmlns="http://www.w3.org/2000/09/xmldsig#">
<SignedInfo>
<CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315"></CanonicalizationMethod>
<SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#dsa-sha1"></SignatureMethod>
<Reference URI="">
<Transforms>
<Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"></Transform>
<Transform Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315#WithComments"></Transform>
</Transforms>
<DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"></DigestMethod>
<DigestValue>f+pDsT3LzyKV9Sg6rdK5bBrQlbo=</DigestValue>
</Reference>
</SignedInfo>
<SignatureValue>QNoLqAc0KYDmomJA3LvXhCf6vpuN/wh9R4y42QylvJCko9gRDhpHAA==</SignatureValue>
<KeyInfo>...</KeyInfo>
</Signature>
</apache:RootElement>

Signature
XML-Signature - <SignedInfo />
<SignedInfo>
<CanonicalizationMethod />
<SignatureMethod />
<Reference URI >
<Transforms />
<DigestMethd />
<DigestValue />
</Reference>
</SignedInfo>
<Reference/>
Points to the elements which are being signed.
Any element inside the same XML document
starts from “#”.
XML-Signature (Example-1)
<ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
<ds:SignedInfo>
<ds:CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315"></ds:CanonicalizationMethod>
<ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#dsa-sha1"></ds:SignatureMethod>
<ds:Reference URI="#TheFirstObject">
<ds:Transforms>
<ds:Transform Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315#WithComments"></ds:Transform>
</ds:Transforms>
<ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"></ds:DigestMethod>
<ds:DigestValue>ipbs0UyafkdRIcfIo9zyZLce+CE=</ds:DigestValue>
</ds:Reference>
</ds:SignedInfo>
<ds:SignatureValue>BSChZzMdH1kHVbKL+EyNorZXcEZ9ekL+cf/VW8ejhItfZoXOZQVNnw==</ds:SignatureValue>
<ds:KeyInfo> ... </ds:KeyInfo>
<ds:Object Id="TheFirstObject">
<InsideObject>A text in a box</InsideObject>
</ds:Object>
</ds:Signature>

Signature
XML-Signature (Example-2)
<apache:RootElement xmlns:apache="http://www.apache.org/ns/#app1" xmlns:foo="http://example.org/#foo">Some simple text
<Signature xmlns="http://www.w3.org/2000/09/xmldsig#">
<SignedInfo>
<CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315"></CanonicalizationMethod>
<SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#dsa-sha1"></SignatureMethod>
<Reference URI="">
<Transforms>
<Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"></Transform>
<Transform Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315#WithComments"></Transform>
</Transforms>
<DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"></DigestMethod>
<DigestValue>f+pDsT3LzyKV9Sg6rdK5bBrQlbo=</DigestValue>
</Reference>
</SignedInfo>
<SignatureValue>QNoLqAc0KYDmomJA3LvXhCf6vpuN/wh9R4y42QylvJCko9gRDhpHAA==</SignatureValue>
<KeyInfo>...</KeyInfo>
</Signature>
</apache:RootElement>

Signature
QUESTION 8

How do we reference an XML element in an
external XML document ?
XML-Signature - <Reference/>
<SignedInfo>
<CanonicalizationMethod />
<SignatureMethod />
<Reference URI >
<Transforms />
<DigestMethd />
<DigestValue />
</Reference>
</SignedInfo>
<Transforms/>
- <Transforms/> receive the results of
dereferencing the <Reference URI=“”> and
alter the result in some way.
- A simple <Transform> can be an Xpath
statement that causes the signature to apply
only to a part of an XML document.
- Multiple transforms can appear under a
<Reference> working in a pipe-line fashion.
- <Transform Algorithm=“” />
QUESTION 9

What is the difference between
CanonicalizationMethod and the Transforms ?
<Transforms/>
XML Signature spec defines five Transforms
1. Canonicalization

2. Base-64
3. XPath Filtering
4. Enveloped Signature Transform
5. XSLT Transform
<Transforms/>
Canonicalization
- Normalize the XML, so that regardless of

physical inconsistencies, two logically
equivalent XML documents will become
physically bit to bit to equivalent.
<Order>
<Items>

<Order>
<Items>
<item number=100></item>
<item number=101></item>
</Items>
</Order>

<item number=100/>
<item number=101/>
</Items>
</Order>
<Transforms/>
Base-64

- Maps binary data into text
- http://www.w3.org/2000/09/xmldsig#base64
<Transforms/>
XPath Filtering
- Commonly used when we want to sign just a
fragment of an XML document.
- http://www.w3.org/TR/1999/REC-xpath-19991116
<Transforms/>
Enveloped Signature Transform
- Commonly used in Enveloped Signatures where the parent
element is to be signed.
- Need to remove the Signature element from the element
being signed before validation.
http://www.w3.org/2000/09/xmldsig#enveloped-signature
QUESTION 10

Provide an example for Enveloped Signature
Transformation and explain why its needed?
<Transforms/>
XSLT Transform
- A good practice is to sign what actually the signer sees.
- Used to sign XML documents when an XSL is involved.
- http://www.w3.org/TR/1999/REC-xslt-19991116
XML-Signature - <Reference/>
<SignedInfo>
<CanonicalizationMethod />
<SignatureMethod />
<Reference URI >
<Transforms />
<DigestMethd />
<DigestValue />
</Reference>
</SignedInfo>
<DigestMethod/>
- Algorithm to calculate the digest of the
element/resource pointed by the <Reference URI=“”>
- <DigestMethod
Algorithm=http://www.w3.org/2000/09/xmldsig#sha
1 />
QUESTION 11

Explain two digest methods with similarities and
differences.
<DigestValue/>
- Contains Base-64 encoded value of the digest
<DigestValue>f+pDsT3LzyKV9Sg6rdK5bBrQlbo=</Dige
stValue>
QUESTION 12

Why do we have to base64 encode the digest
value ?
XML-Signature
<Signature
xmlns=“…../2000/09/xmldsig#”>
<SignedInfo />
<SignatureValue />
<KeyInfo />
<Object />
</Signature>
<SignatureValue/>

The Base-64 resulting value of encrypting the
digest of the <SignedInfo/> element.
QUESTION 13

Where do we specify the digest method to
create the digest of the SignedInfo ?
XML-Signature
<Signature
xmlns=“…../2000/09/xmldsig#”>
<SignedInfo />
<SignatureValue />
<KeyInfo />
<Object />
</Signature>
<KeyInfo>

This is an optional element in the XML Signature, if
no KeyInfo – it is expected that we what the
validation key is.
<KeyInfo>
<KeyInfo>

<KeyName />
<KeyValue />
<RetrievalMethod />
<X509Data />
<PGPData />
<SPKIData />
</KeyInfo>
<KeyName/>

A unique name to identify the associated key.
<KeyInfo>
<KeyInfo>

<KeyName />
<KeyValue />
<RetrievalMethod />
<X509Data />
<PGPData />
<SPKIData />
</KeyInfo>
<KeyValue/>

Actual key it self embedded in XML.
<KeyInfo>
<KeyInfo>

<KeyName />
<KeyValue />
<RetrievalMethod />
<X509Data />
<PGPData />
<SPKIData />
</KeyInfo>
<RetrievalMethod/>
- Used to reference a key that is stored in a separate location.
- If multiple signatures use the same key, we can keep the
KeyInfo structure in a standalone element with a unique ID
and refer to using <RetrievalMethod/> of each <Signature>
- Either or both the ds:KeyName and RetrievalMethod could be
used to identify the same key.

<KeyInfo>
<RetrievalMethod URI='#EK' "/>
<KeyName>Sally Doe</KeyName>

<KeyInfo>
<KeyInfo>
<KeyInfo>

<KeyName />
<KeyValue />
<RetrievalMethod />
<X509Data />
<PGPData />
<SPKIData />
</KeyInfo>
<X509Data/>
- Provides either an identifier to look to look up

an X509 certificate or the X509 certificate it
self.

- A certificate chain can also be contained in
X509Data
<KeyInfo>
<KeyInfo>

<KeyName />
<KeyValue />
<RetrievalMethod />
<X509Data />
<PGPData />
<SPKIData />
</KeyInfo>
<PGPData/>

Can point to the PGP key or can contain the key it
self.
<KeyInfo>
<KeyInfo>

<KeyName />
<KeyValue />
<RetrievalMethod />
<X509Data />
<PGPData />
<SPKIData />
</KeyInfo>
<SPKIData/>

Similar to PGPData point to the key or contains
key it self.
XML-Signature
<Signature
xmlns=“…../2000/09/xmldsig#”>
<SignedInfo />
<SignatureValue />
<KeyInfo />
<Object />
</Signature>
<Object/>
- Can put anything you want.
- Typically includes one of the following three
1. XML fragment or a base-64 encoded binary
object – Enveloping Signature
2. A <Manifest> element
3. A <SignatureProperties> element
<Manifest/>
<Object>
<Manifest Id=“101”>
<Reference>…. </Reference>

<Reference> …. </Reference>
</Manifest>

</Object>
<Manifest/>
- Contains a list of references
- <Reference> elements inside <SignedInfo> element
must be validated in order to accept the signature a
valid one.
- To validate or not to validate <Reference> elements
inside <Manifest> element is up to the developer
decide.
- Developers get more granular control over which
<Reference> mater and which does not.
<Manifest/>
<SignedInfo>
<Reference URI=“101”
Type=“"http://www.w3.org/2000/09/xmldsig#Man
ifest"”>
……

</Reference>
</SignedInfo>
<SignatureProperties/>
Provides a place to put name/value information
about the signature it self.
<Object>
<SignatureProperties>
<SignatureProperty Id=“101” Target=“#100”>
<timestamp xmlns=“”>
<date>….</date>
<time>….</time>
</timestamp>
</SignatureProperty>
</SignatureProperties>
</Object>
<SignatureProperties/>
<Signature Id=“100”>
<SignedInfo>
<Reference URI=“101”
Type=“"
http://www.w3.org/2000/09/xmldsig#SignatureProperties "”>
……
</Reference>
</SignedInfo>
</Signature>
XML-Signature Building Process
- Reference Generation
- Signature Generation
XML-Signature Ref. Generation
1. Obtain the resource specified by the <Reference
URI=“” >
2. Apply Transforms
3. Calculate the digest for the final output from the
Transform algorithm, using the <DigestMethod>
4. Create the <Reference> element including all it’s sub
elements by populating the <DigestValue>
5. Perform the above actions to all the <Reference>
elements found inside <SignedInfo>
XML-Signature Sig. Generation
1. Create the <SignedInfo> element
2. Canonicalize <SignedInfo> element using the
algorithm specified under <CanonicalizationMethod>
3. Create a hash for the out put of the canonicalization
using the <SignatureMethod> specified.
4. Create the <SignatureValue> with the
<SignatureMethod> specified, against the
canonicalized, hashed <SignedInfo>
5. Build the complete <Signature> element
XML-Signature Validation Process
- Reference Validation
- Signature Validation
XML-Signature Ref. Validation
1. Canonicalize the <SignedInfo> element based
on the <CanonicalizationMethod> element.
2. For each <Reference> element do the following
3. Get the resource pointed out by the
<Reference>
4. Apply Transforms
5. Create a hash using the <DigestMethod>
6. Find the DigestValue and compare it with the
DigestValue returned.
XML-Signature Sig. Validation
1. Obtain the key used to sign the message
2. Create a hash of the canonicalized <SignedInfo>
3. Using the verification key decrypt the
<SignatureValue>
4. Compare the value from 3 with value from 2.
lean . enterprise . middleware

More Related Content

What's hot

Active directory
Active directory Active directory
Active directory deshvikas
 
Palo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El LathyPalo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El LathyMostafa El Lathy
 
Php(report)
Php(report)Php(report)
Php(report)Yhannah
 
Journey Through The Cloud - Disaster Recovery
Journey Through The Cloud - Disaster RecoveryJourney Through The Cloud - Disaster Recovery
Journey Through The Cloud - Disaster RecoveryAmazon Web Services
 
An Overview of Web Services: SOAP and REST
An Overview of Web Services: SOAP and REST An Overview of Web Services: SOAP and REST
An Overview of Web Services: SOAP and REST Ram Awadh Prasad, PMP
 
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...Lenur Dzhemiliev
 
20명 규모의 팀에서 Vault 사용하기
20명 규모의 팀에서 Vault 사용하기20명 규모의 팀에서 Vault 사용하기
20명 규모의 팀에서 Vault 사용하기Doyoon Kim
 
DNS & DNSSEC
DNS & DNSSECDNS & DNSSEC
DNS & DNSSECAPNIC
 

What's hot (20)

Simple object access protocol(soap )
Simple object access protocol(soap )Simple object access protocol(soap )
Simple object access protocol(soap )
 
XPath Injection
XPath InjectionXPath Injection
XPath Injection
 
Active directory
Active directory Active directory
Active directory
 
Palo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El LathyPalo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El Lathy
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
 
SSL TLS Protocol
SSL TLS ProtocolSSL TLS Protocol
SSL TLS Protocol
 
Owasp Top 10 A1: Injection
Owasp Top 10 A1: InjectionOwasp Top 10 A1: Injection
Owasp Top 10 A1: Injection
 
SSL intro
SSL introSSL intro
SSL intro
 
Soap Vs Rest
Soap Vs RestSoap Vs Rest
Soap Vs Rest
 
Php(report)
Php(report)Php(report)
Php(report)
 
Journey Through The Cloud - Disaster Recovery
Journey Through The Cloud - Disaster RecoveryJourney Through The Cloud - Disaster Recovery
Journey Through The Cloud - Disaster Recovery
 
XSLT presentation
XSLT presentationXSLT presentation
XSLT presentation
 
web server
web serverweb server
web server
 
An Overview of Web Services: SOAP and REST
An Overview of Web Services: SOAP and REST An Overview of Web Services: SOAP and REST
An Overview of Web Services: SOAP and REST
 
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
 
H4x0rs gonna hack
H4x0rs gonna hackH4x0rs gonna hack
H4x0rs gonna hack
 
Broken access controls
Broken access controlsBroken access controls
Broken access controls
 
Soap
SoapSoap
Soap
 
20명 규모의 팀에서 Vault 사용하기
20명 규모의 팀에서 Vault 사용하기20명 규모의 팀에서 Vault 사용하기
20명 규모의 팀에서 Vault 사용하기
 
DNS & DNSSEC
DNS & DNSSECDNS & DNSSEC
DNS & DNSSEC
 

Viewers also liked

Introduction to xml
Introduction to xmlIntroduction to xml
Introduction to xmlGtu Booker
 
07 a breaking_xml_signature_and_encryption_-_juraj_somorovsky
07 a breaking_xml_signature_and_encryption_-_juraj_somorovsky07 a breaking_xml_signature_and_encryption_-_juraj_somorovsky
07 a breaking_xml_signature_and_encryption_-_juraj_somorovskySunny Sreekanth
 
Building an API Security Ecosystem
Building an API Security EcosystemBuilding an API Security Ecosystem
Building an API Security EcosystemPrabath Siriwardena
 
Next-Gen Apps with IoT and Cloud
Next-Gen Apps with IoT and CloudNext-Gen Apps with IoT and Cloud
Next-Gen Apps with IoT and CloudPrabath Siriwardena
 
Connected Identity : Benefits, Risks & Challenges
Connected Identity : Benefits, Risks & ChallengesConnected Identity : Benefits, Risks & Challenges
Connected Identity : Benefits, Risks & ChallengesPrabath Siriwardena
 
The Evolution of Internet Identity
The Evolution of Internet IdentityThe Evolution of Internet Identity
The Evolution of Internet IdentityPrabath Siriwardena
 
Identity Management for Web Application Developers
Identity Management for Web Application DevelopersIdentity Management for Web Application Developers
Identity Management for Web Application DevelopersPrabath Siriwardena
 
WSO2Con USA 2014 - Identity Server Tutorial
WSO2Con USA 2014 - Identity Server TutorialWSO2Con USA 2014 - Identity Server Tutorial
WSO2Con USA 2014 - Identity Server TutorialPrabath Siriwardena
 
Connected Identity : The Role of the Identity Bus
Connected Identity : The Role of the Identity BusConnected Identity : The Role of the Identity Bus
Connected Identity : The Role of the Identity BusPrabath Siriwardena
 
Best Practices in Building an API Security Ecosystem
Best Practices in Building an API Security EcosystemBest Practices in Building an API Security Ecosystem
Best Practices in Building an API Security EcosystemPrabath Siriwardena
 

Viewers also liked (20)

XML Encryption
XML EncryptionXML Encryption
XML Encryption
 
WS - Security
WS - SecurityWS - Security
WS - Security
 
Introduction to xml
Introduction to xmlIntroduction to xml
Introduction to xml
 
Introduction to XML
Introduction to XMLIntroduction to XML
Introduction to XML
 
Manual C#
Manual C#Manual C#
Manual C#
 
07 a breaking_xml_signature_and_encryption_-_juraj_somorovsky
07 a breaking_xml_signature_and_encryption_-_juraj_somorovsky07 a breaking_xml_signature_and_encryption_-_juraj_somorovsky
07 a breaking_xml_signature_and_encryption_-_juraj_somorovsky
 
Evolution of Internet Identity
Evolution of Internet IdentityEvolution of Internet Identity
Evolution of Internet Identity
 
Building an API Security Ecosystem
Building an API Security EcosystemBuilding an API Security Ecosystem
Building an API Security Ecosystem
 
Next-Gen Apps with IoT and Cloud
Next-Gen Apps with IoT and CloudNext-Gen Apps with IoT and Cloud
Next-Gen Apps with IoT and Cloud
 
Securing the Insecure
Securing the InsecureSecuring the Insecure
Securing the Insecure
 
Securing Insecure
Securing InsecureSecuring Insecure
Securing Insecure
 
Web Services Security - Presentation
Web Services Security - PresentationWeb Services Security - Presentation
Web Services Security - Presentation
 
Connected Identity : Benefits, Risks & Challenges
Connected Identity : Benefits, Risks & ChallengesConnected Identity : Benefits, Risks & Challenges
Connected Identity : Benefits, Risks & Challenges
 
The Evolution of Internet Identity
The Evolution of Internet IdentityThe Evolution of Internet Identity
The Evolution of Internet Identity
 
Identity Management for Web Application Developers
Identity Management for Web Application DevelopersIdentity Management for Web Application Developers
Identity Management for Web Application Developers
 
WS - SecurityPolicy
WS - SecurityPolicyWS - SecurityPolicy
WS - SecurityPolicy
 
WSO2Con USA 2014 - Identity Server Tutorial
WSO2Con USA 2014 - Identity Server TutorialWSO2Con USA 2014 - Identity Server Tutorial
WSO2Con USA 2014 - Identity Server Tutorial
 
Connected Identity : The Role of the Identity Bus
Connected Identity : The Role of the Identity BusConnected Identity : The Role of the Identity Bus
Connected Identity : The Role of the Identity Bus
 
WS-Trust
WS-TrustWS-Trust
WS-Trust
 
Best Practices in Building an API Security Ecosystem
Best Practices in Building an API Security EcosystemBest Practices in Building an API Security Ecosystem
Best Practices in Building an API Security Ecosystem
 

Similar to XML Signature

Application Integration with XProc
Application Integration with XProcApplication Integration with XProc
Application Integration with XProcVojtech Toman
 
Attack monitoring using ElasticSearch Logstash and Kibana
Attack monitoring using ElasticSearch Logstash and KibanaAttack monitoring using ElasticSearch Logstash and Kibana
Attack monitoring using ElasticSearch Logstash and KibanaPrajal Kulkarni
 
Layer 7 Technologies: What Is An Xml Firewall
Layer 7 Technologies: What Is An Xml FirewallLayer 7 Technologies: What Is An Xml Firewall
Layer 7 Technologies: What Is An Xml FirewallCA API Management
 
Web Api services using IBM Datapower
Web Api services using IBM DatapowerWeb Api services using IBM Datapower
Web Api services using IBM DatapowerSigortam.net
 
dist-access. access control in distributed systemspdf
dist-access. access control in distributed systemspdfdist-access. access control in distributed systemspdf
dist-access. access control in distributed systemspdfNohaNagy5
 
Hands-On XML Attacks
Hands-On XML AttacksHands-On XML Attacks
Hands-On XML AttacksToe Khaing
 
MuleSoft ESB Payload Encrypt Decrypt using anypoint enterprise security
MuleSoft ESB Payload Encrypt Decrypt using anypoint enterprise securityMuleSoft ESB Payload Encrypt Decrypt using anypoint enterprise security
MuleSoft ESB Payload Encrypt Decrypt using anypoint enterprise securityakashdprajapati
 
Hidden automation-the-power-of-gel-scripting
Hidden automation-the-power-of-gel-scriptingHidden automation-the-power-of-gel-scripting
Hidden automation-the-power-of-gel-scriptingPrashank Singh
 
.Net framework
.Net framework.Net framework
.Net frameworkteach4uin
 
Real World Experience With Oracle Xml Database 11g An Oracle Ace’s Perspectiv...
Real World Experience With Oracle Xml Database 11g An Oracle Ace’s Perspectiv...Real World Experience With Oracle Xml Database 11g An Oracle Ace’s Perspectiv...
Real World Experience With Oracle Xml Database 11g An Oracle Ace’s Perspectiv...Marco Gralike
 
Same Origin Policy Weaknesses
Same Origin Policy WeaknessesSame Origin Policy Weaknesses
Same Origin Policy Weaknesseskuza55
 
Basics of Solr and Solr Integration with AEM6
Basics of Solr and Solr Integration with AEM6Basics of Solr and Solr Integration with AEM6
Basics of Solr and Solr Integration with AEM6DEEPAK KHETAWAT
 
Taming Deployment With Smart Frog
Taming Deployment With Smart FrogTaming Deployment With Smart Frog
Taming Deployment With Smart FrogSteve Loughran
 
Web Exploitation Security
Web Exploitation SecurityWeb Exploitation Security
Web Exploitation SecurityAman Singh
 
(WEB301) Operational Web Log Analysis | AWS re:Invent 2014
(WEB301) Operational Web Log Analysis | AWS re:Invent 2014(WEB301) Operational Web Log Analysis | AWS re:Invent 2014
(WEB301) Operational Web Log Analysis | AWS re:Invent 2014Amazon Web Services
 
Boost Your Environment With XMLDB - UKOUG 2008 - Marco Gralike
Boost Your Environment With XMLDB - UKOUG 2008 - Marco GralikeBoost Your Environment With XMLDB - UKOUG 2008 - Marco Gralike
Boost Your Environment With XMLDB - UKOUG 2008 - Marco GralikeMarco Gralike
 
Unify Earth Observation products access with OpenSearch
Unify Earth Observation products access with OpenSearchUnify Earth Observation products access with OpenSearch
Unify Earth Observation products access with OpenSearchGasperi Jerome
 
How fluentd fits into the modern software landscape
How fluentd fits into the modern software landscapeHow fluentd fits into the modern software landscape
How fluentd fits into the modern software landscapePhil Wilkins
 

Similar to XML Signature (20)

Application Integration with XProc
Application Integration with XProcApplication Integration with XProc
Application Integration with XProc
 
Attack monitoring using ElasticSearch Logstash and Kibana
Attack monitoring using ElasticSearch Logstash and KibanaAttack monitoring using ElasticSearch Logstash and Kibana
Attack monitoring using ElasticSearch Logstash and Kibana
 
Layer 7 Technologies: What Is An Xml Firewall
Layer 7 Technologies: What Is An Xml FirewallLayer 7 Technologies: What Is An Xml Firewall
Layer 7 Technologies: What Is An Xml Firewall
 
Web Api services using IBM Datapower
Web Api services using IBM DatapowerWeb Api services using IBM Datapower
Web Api services using IBM Datapower
 
dist-access. access control in distributed systemspdf
dist-access. access control in distributed systemspdfdist-access. access control in distributed systemspdf
dist-access. access control in distributed systemspdf
 
Hands-On XML Attacks
Hands-On XML AttacksHands-On XML Attacks
Hands-On XML Attacks
 
MuleSoft ESB Payload Encrypt Decrypt using anypoint enterprise security
MuleSoft ESB Payload Encrypt Decrypt using anypoint enterprise securityMuleSoft ESB Payload Encrypt Decrypt using anypoint enterprise security
MuleSoft ESB Payload Encrypt Decrypt using anypoint enterprise security
 
Hidden automation-the-power-of-gel-scripting
Hidden automation-the-power-of-gel-scriptingHidden automation-the-power-of-gel-scripting
Hidden automation-the-power-of-gel-scripting
 
.Net framework
.Net framework.Net framework
.Net framework
 
Real World Experience With Oracle Xml Database 11g An Oracle Ace’s Perspectiv...
Real World Experience With Oracle Xml Database 11g An Oracle Ace’s Perspectiv...Real World Experience With Oracle Xml Database 11g An Oracle Ace’s Perspectiv...
Real World Experience With Oracle Xml Database 11g An Oracle Ace’s Perspectiv...
 
Same Origin Policy Weaknesses
Same Origin Policy WeaknessesSame Origin Policy Weaknesses
Same Origin Policy Weaknesses
 
Basics of Solr and Solr Integration with AEM6
Basics of Solr and Solr Integration with AEM6Basics of Solr and Solr Integration with AEM6
Basics of Solr and Solr Integration with AEM6
 
Cetpa dotnet taining
Cetpa dotnet tainingCetpa dotnet taining
Cetpa dotnet taining
 
Taming Deployment With Smart Frog
Taming Deployment With Smart FrogTaming Deployment With Smart Frog
Taming Deployment With Smart Frog
 
Web Exploitation Security
Web Exploitation SecurityWeb Exploitation Security
Web Exploitation Security
 
Information Security Engineering
Information Security EngineeringInformation Security Engineering
Information Security Engineering
 
(WEB301) Operational Web Log Analysis | AWS re:Invent 2014
(WEB301) Operational Web Log Analysis | AWS re:Invent 2014(WEB301) Operational Web Log Analysis | AWS re:Invent 2014
(WEB301) Operational Web Log Analysis | AWS re:Invent 2014
 
Boost Your Environment With XMLDB - UKOUG 2008 - Marco Gralike
Boost Your Environment With XMLDB - UKOUG 2008 - Marco GralikeBoost Your Environment With XMLDB - UKOUG 2008 - Marco Gralike
Boost Your Environment With XMLDB - UKOUG 2008 - Marco Gralike
 
Unify Earth Observation products access with OpenSearch
Unify Earth Observation products access with OpenSearchUnify Earth Observation products access with OpenSearch
Unify Earth Observation products access with OpenSearch
 
How fluentd fits into the modern software landscape
How fluentd fits into the modern software landscapeHow fluentd fits into the modern software landscape
How fluentd fits into the modern software landscape
 

More from Prabath Siriwardena

Microservices Security Landscape
Microservices Security LandscapeMicroservices Security Landscape
Microservices Security LandscapePrabath Siriwardena
 
Cloud Native Identity with SPIFFE
Cloud Native Identity with SPIFFECloud Native Identity with SPIFFE
Cloud Native Identity with SPIFFEPrabath Siriwardena
 
API Security Best Practices & Guidelines
API Security Best Practices & GuidelinesAPI Security Best Practices & Guidelines
API Security Best Practices & GuidelinesPrabath Siriwardena
 
Microservices Security Landscape
Microservices Security LandscapeMicroservices Security Landscape
Microservices Security LandscapePrabath Siriwardena
 
Blockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access ManagementBlockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access ManagementPrabath Siriwardena
 
OAuth 2.0 for Web and Native (Mobile) App Developers
OAuth 2.0 for Web and Native (Mobile) App DevelopersOAuth 2.0 for Web and Native (Mobile) App Developers
OAuth 2.0 for Web and Native (Mobile) App DevelopersPrabath Siriwardena
 
API Security Best Practices & Guidelines
API Security Best Practices & GuidelinesAPI Security Best Practices & Guidelines
API Security Best Practices & GuidelinesPrabath Siriwardena
 
Open Standards in Identity Management
Open Standards  in  Identity ManagementOpen Standards  in  Identity Management
Open Standards in Identity ManagementPrabath Siriwardena
 
Securing Single-Page Applications with OAuth 2.0
Securing Single-Page Applications with OAuth 2.0Securing Single-Page Applications with OAuth 2.0
Securing Single-Page Applications with OAuth 2.0Prabath Siriwardena
 
API Security : Patterns and Practices
API Security : Patterns and PracticesAPI Security : Patterns and Practices
API Security : Patterns and PracticesPrabath Siriwardena
 
Deep dive into Java security architecture
Deep dive into Java security architectureDeep dive into Java security architecture
Deep dive into Java security architecturePrabath Siriwardena
 

More from Prabath Siriwardena (17)

Microservices Security Landscape
Microservices Security LandscapeMicroservices Security Landscape
Microservices Security Landscape
 
Cloud Native Identity with SPIFFE
Cloud Native Identity with SPIFFECloud Native Identity with SPIFFE
Cloud Native Identity with SPIFFE
 
API Security Best Practices & Guidelines
API Security Best Practices & GuidelinesAPI Security Best Practices & Guidelines
API Security Best Practices & Guidelines
 
Identity is Eating the World!
Identity is Eating the World!Identity is Eating the World!
Identity is Eating the World!
 
Microservices Security Landscape
Microservices Security LandscapeMicroservices Security Landscape
Microservices Security Landscape
 
OAuth 2.0 Threat Landscape
OAuth 2.0 Threat LandscapeOAuth 2.0 Threat Landscape
OAuth 2.0 Threat Landscape
 
GDPR for Identity Architects
GDPR for Identity ArchitectsGDPR for Identity Architects
GDPR for Identity Architects
 
Blockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access ManagementBlockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access Management
 
OAuth 2.0 Threat Landscapes
OAuth 2.0 Threat LandscapesOAuth 2.0 Threat Landscapes
OAuth 2.0 Threat Landscapes
 
OAuth 2.0 for Web and Native (Mobile) App Developers
OAuth 2.0 for Web and Native (Mobile) App DevelopersOAuth 2.0 for Web and Native (Mobile) App Developers
OAuth 2.0 for Web and Native (Mobile) App Developers
 
API Security Best Practices & Guidelines
API Security Best Practices & GuidelinesAPI Security Best Practices & Guidelines
API Security Best Practices & Guidelines
 
Open Standards in Identity Management
Open Standards  in  Identity ManagementOpen Standards  in  Identity Management
Open Standards in Identity Management
 
Securing Single-Page Applications with OAuth 2.0
Securing Single-Page Applications with OAuth 2.0Securing Single-Page Applications with OAuth 2.0
Securing Single-Page Applications with OAuth 2.0
 
API Security : Patterns and Practices
API Security : Patterns and PracticesAPI Security : Patterns and Practices
API Security : Patterns and Practices
 
Advanced API Security
Advanced API SecurityAdvanced API Security
Advanced API Security
 
Deep dive into Java security architecture
Deep dive into Java security architectureDeep dive into Java security architecture
Deep dive into Java security architecture
 
Preparing for Tomorrow
Preparing for TomorrowPreparing for Tomorrow
Preparing for Tomorrow
 

Recently uploaded

Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 

Recently uploaded (20)

Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

XML Signature