SlideShare a Scribd company logo
SENIOR PROJECT 2007-2008
(Step#4 of the ekoSign project)

8. Management Sends Order to the
Warehouse
Developing Application that Uses XML
Signatures

Project team members

Hüseyin Çakır, Mehmet Mesut Özışık, Yılmaz Kaya

Abstract: Fourth step of the application which is management sends order to the warehouse. This phase
includes XML document signatures, encryption of informations at XML, verifying XML signatures and
decrypting encrypted XML data.
Keywords: Management sends order to the warehouse, XML Signature and Encryption.

http://groups.google.com/group/digitalsignature
digitalsignature@googlegroups.com
PRINT DATE: 05/06/08

1
8.1 Introduction
This documentation is related with the construction phase of the project. Management sends order
to the warehouse is one of the parts of construction phases and the series of iterations of the system
are implemented and an executable release of the step is developed. The implementation of this step
is built according to the use case diagrams and use case by text. Figure 8.1 shows the steps of the
unified process and which step the project plan paper belongs to.

Inception

1.Introduction
2.Project Plan
3.Basic Concepts

Elaboration

4.Scenario

Construction

Transition

5.CSorder
6.SDSorderW
7.SDSorderM
8.MSorderW

Figure 8.1 Steps of Unified Process.

8.2 Management Sends Order to the Warehouse
Management receives an order from SD indicating that 1500 units of product worth of 100000$ are
needed on 21.02.2008 at 10:00. Since the cost of order is higher than 50000$, management is
authorized to sign order and send to the Warehouse (Figure 8.2).

Figure 8.2 Scenario.

2
SIGNATURES: CUSTOMER, SALES DEPARTMENT, MANAGEMENT
1500 units of product worth of 100000$ are needed on 21.02.2008 at 10:00.
XML DOCUMENT THAT CUSTOMER SENDS TO THE SALES DEPARTMENT: A sample XML includes
customer's signature, sales department signature, management signature and
encrypted order information.
<order>
<!-ENCRYPTED ORDER INFORMATION-->

<EncryptedData xmlns="http://www.w3.org/2001/04/xmlenc#"
Encrypted Customer Order
Type="http://www.w3.org/2001/04/xmlenc#Element">
<EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#aes256-cbc" />
<KeyInfo xmlns="http://www.w3.org/2000/09/xmldsig#">
<EncryptedKey xmlns="http://www.w3.org/2001/04/xmlenc#">
<EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#rsa-1_5" />
<KeyInfo xmlns="http://www.w3.org/2000/09/xmldsig#">
<KeyName>rsaKey</KeyName>
</KeyInfo>
<CipherData>
<CipherValue>NpXleAAvjsx/afFGVFM3jKDk/Dj2prknl1eXcf7+gveP7+2pa26ILGlAPV0NTFLkQxTwHSfhk
V4y0PMr7xPNQ9a8qNcsN7MPSl45OoTE0l7yJD5jD0462rlXmCwEVdgZi3Oi0LA2dto/SxCSKicxbiBIeZl1iWctRo
WfkrzgKkw=</CipherValue>
</CipherData>
</EncryptedKey>
</KeyInfo>
<CipherData>
<CipherValue>gn4aaCOi/5P2+k5HHJ2vzMltSXt6O2+SMiNXFCn8mq/fHvRxwqqSBeejPiEpI4iXg/u0AhKz2jlN
EPqbnMB17EfT81DiW5VYAPssA8NM
+cmdccTotWtj32EnOqIJNVsanPl4i/RsXFwL6a7K2YIHe6l0Tewwyj3ZWSSzHbq1c2GsGi0qBAXe1vsRrDr1cmW/C
rbJDW70YzMuoVS8IysYgm9n96Wo/dTyaGPl+fG
+Cs5KAZyDZRRSP9CXDJ38WZGGRfdQCnvhf8ztG8CuB9mruK56mtjz9rV3HkqM2etLDzcbXmkeyAErSJrS4W5n
zw7NkbZOMht2JdTN+XhcTrS2GA==</CipherValue>
</CipherData>
</EncryptedData>
<!-SALES DEPARTMENT MESSAGE-->
<salesDept Id="s">Cost is higher than 50000$, the confirmation
management.</salesDept>
<!-MANAGEMENT MESSAGE-->
<management Id="m">1500 units of product is required.</management>
<!-SIGNATURE OF CUSTOMER-->

needed

from

<Signature xmlns="http://www.w3.org/2000/09/xmldsig#">
<SignedInfo>
<CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315" />
<SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1" /> Signature #1: Customer
<Reference URI="#c">
<Transforms>
<Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature" />
</Transforms>
<DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1" />
<DigestValue>VSh4kpOimvsxdy2hpfnozUZrL+Q=</DigestValue>
</Reference>
</SignedInfo>
<SignatureValue>ScVHcqcvXt3/mfB6CVKOGG5DcFvt/30Cc9LwabCpebDCHiXtA
+bsx6AUnd1c9g6VPxrgClynopWqd9fQYBNy7e1DzOnLSn/Ya8Bzfe3SaMsTS7Xw8jmJRjTMJEsWGrEX1d/zdpa4s
5H4A0i5FNXDlrXkhO3NpS5bffD1C9CJIjw=</SignatureValue>
</Signature>

3
<!-SIGNATURE OF SALES DEPARTMENT-->

<Signature xmlns="http://www.w3.org/2000/09/xmldsig#">
<SignedInfo>
Signature #2: Sales Dept.
<CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315" />
<SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1" />
<Reference URI="#s">
<Transforms>
<Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature" />
</Transforms>
<DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1" />
<DigestValue>cLYt4vVedV3M6Pu+/WX1uuf/K58=</DigestValue>
</Reference>
</SignedInfo>
<SignatureValue>IRIhYrEwZKQcJikufCfnL0st1l7SBrZtxsq+jaJ8jP/l3yiv1MkeAkzmpH2t+RAhbG1BB
+iwjenI2IvPJRbkejj4woBtNSSNJ+VFOh9KgC3BEgJy8BQ6ub76cThLgMJ
+u0TuuyjBGGDcdRt8HJpIs7WBFLyErmPGHG5s6XieZL0=</SignatureValue>
</Signature>
<!-SIGNATURE OF MANAGEMENT-->

<Signature xmlns="http://www.w3.org/2000/09/xmldsig#">
<SignedInfo>
Signature #3: Manegement
<CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315" />
<SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1" />
<Reference URI="#m">
<Transforms>
<Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature" />
</Transforms>
<DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1" />
<DigestValue>orNVV1C8Ckyz3XNuGxF/Qz2wjY4=</DigestValue>
</Reference>
</SignedInfo>
<SignatureValue>Yukm1rqP219Cw17HFPGikqBj
+LWvJyrvYhBr4dcUzecDdveqTCSmqpqKzEbSo8ITPlPuRIvhMJdJ9ImuM/Bbt7zvFHl48SqNqVtsFoEb
+DUXhd8uM9JnmF/SPwghHYCNneXGBB6mA+TVugDaZ3Jjxs869DCu8+zgo9TIoFeiPaQ=</SignatureValue>
</Signature>
</order>

Table 8.1 Management Sends Sample XML Order to Warehouse.

4
8.3 Use Case Diagram of Management Sends Order to Warehouse
Figure 8.3 represents Management sending the document to the warehouse and Use case text of the
diagram is shown in Figure 8.4.

Use Case Title

Figure 8.3 Use Case Diagram of Management sending order.
:Management sending order to the warehouse

Primary Actor

:Management

Precondition

:Management must validate the previous signatures

Success Guarantee :Company Policy applied and order sent to the authorized
department
Trigger

:Management receives order from sales department

Main Success Scenario:
1. Page loaded to the management staff computer.
2. Management verifies the company policy.
3. After validation the order will be sent to the warehouse.
Figure 8.4 Use Case by Text for Management Sends Order.

5
8.4 Class Diagram of Sales Department Applies Policy and Sends Order
This step uses six classes which are “signature”, “verifySignature”, “encryption”, “decryption”,
“customer” and “order”.
“signature” class includes a method “SignXml” that sign XML document and attach the signature
to the document in a <Signature> element. The method creates an cryptographic signing key, adds
the key to a secure key container, and then uses the key to digitally sign an XML document. The
key can then be retrieved to verify the XML digital signature, or be used to sign another XML
document.
“encryption” class has a method “Encrypt” that encrypts an XML element using two keys. It
generates a cryptographic public/private key pair and saves the key pair to a secure key container.
The method then creates a separate session key using a cryptographic algorithm. The method uses
the session key to encrypt the XML document and then uses the public key to encrypt the session
key. Finally, the method saves the encrypted session key and the encrypted XML data to the XML
document within a new <EncryptedData> element.
“customer” class stores two different attributes and “order” class that stores four different attributes
that is used to get data from the user interface. This class's attributes encrypted by “Encryption”
class that uses “encrypt” method to safely send data to the Company Sales Department.

Figure 8.5 Class Diagram of Sales Department Receives Order and Applies Policy .

6
8.5 Sequence & Collaboration Diagrams of Management Sends Order to the
Warehouse
Sequence Diagram shows the interactions between objects to perform critical pieces of use case
behavior in time-ordered manner. Sequence Diagram for Step#1 of the project developed in Figure
8.6 is developed from the class diagram in Figure 8.5.

Figure 8.6 Sequence Diagram of Management Sends Order to the Warehouse.

7
Collaboration Diagram that shows the interactions between objects to perform critical pieces of the
use case behavior is developed in Figure 8.7.

Figure 8.7 Collaboration Diagram of Management Sends Order to the Warehouse.

8
8.6 User Interfaces
Figure 8.8 represents an interface that is used by management staff to view and send orders to the
warehouse.

Figure 8.8 Management Interface for Displaying Orders Received.

9

More Related Content

Viewers also liked

Conclusion
ConclusionConclusion
Conclusion
Hüseyin Çakır
 
DEVELOPMENT OF FUZZY SYLLOGISTIC ALGORITHMS AND APPLICATIONS DISTRIBUTED REAS...
DEVELOPMENT OF FUZZY SYLLOGISTIC ALGORITHMS AND APPLICATIONS DISTRIBUTED REAS...DEVELOPMENT OF FUZZY SYLLOGISTIC ALGORITHMS AND APPLICATIONS DISTRIBUTED REAS...
DEVELOPMENT OF FUZZY SYLLOGISTIC ALGORITHMS AND APPLICATIONS DISTRIBUTED REAS...
Hüseyin Çakır
 
Cover
CoverCover
Introduction
IntroductionIntroduction
Introduction
Hüseyin Çakır
 
Scenario
ScenarioScenario
Project plan
Project planProject plan
Project plan
Hüseyin Çakır
 
Appendix
AppendixAppendix
Relazione ferramonti1
Relazione ferramonti1Relazione ferramonti1
Relazione ferramonti1
16francesco
 
Ppt school
Ppt schoolPpt school
Ppt school
16francesco
 
Jews
JewsJews
Jews before world war ii, k. chabinska, l.kokot
Jews before world war ii, k. chabinska, l.kokotJews before world war ii, k. chabinska, l.kokot
Jews before world war ii, k. chabinska, l.kokot
16francesco
 
Event dunia
Event duniaEvent dunia
Event dunia
krishna chaitanya
 
Arch hasan fathi
Arch hasan fathiArch hasan fathi
Arch hasan fathi
Archi UHBBC
 
Juliusz slowacki secondary school in czestochowa, poland
Juliusz slowacki secondary school in czestochowa, polandJuliusz slowacki secondary school in czestochowa, poland
Juliusz slowacki secondary school in czestochowa, poland
16francesco
 
Aev school presentation
Aev   school presentationAev   school presentation
Aev school presentation
16francesco
 
PASAR
PASARPASAR
Matechef 2
Matechef 2Matechef 2
Matechef 2
Reichel Sin Más
 
Gravitation theory
Gravitation theoryGravitation theory
Gravitation theory
DrDevil1998
 
Thesis Defense Exam Presentation
Thesis Defense Exam PresentationThesis Defense Exam Presentation
Thesis Defense Exam Presentation
Hüseyin Çakır
 
Mε τους δώδεκα θεούς από το χθες στο σήμερα(πολιτιστικό πρόγραμμα γ΄δημοτικού)
Mε τους δώδεκα θεούς από το χθες στο σήμερα(πολιτιστικό πρόγραμμα γ΄δημοτικού)Mε τους δώδεκα θεούς από το χθες στο σήμερα(πολιτιστικό πρόγραμμα γ΄δημοτικού)
Mε τους δώδεκα θεούς από το χθες στο σήμερα(πολιτιστικό πρόγραμμα γ΄δημοτικού)
xaroumenimaria
 

Viewers also liked (20)

Conclusion
ConclusionConclusion
Conclusion
 
DEVELOPMENT OF FUZZY SYLLOGISTIC ALGORITHMS AND APPLICATIONS DISTRIBUTED REAS...
DEVELOPMENT OF FUZZY SYLLOGISTIC ALGORITHMS AND APPLICATIONS DISTRIBUTED REAS...DEVELOPMENT OF FUZZY SYLLOGISTIC ALGORITHMS AND APPLICATIONS DISTRIBUTED REAS...
DEVELOPMENT OF FUZZY SYLLOGISTIC ALGORITHMS AND APPLICATIONS DISTRIBUTED REAS...
 
Cover
CoverCover
Cover
 
Introduction
IntroductionIntroduction
Introduction
 
Scenario
ScenarioScenario
Scenario
 
Project plan
Project planProject plan
Project plan
 
Appendix
AppendixAppendix
Appendix
 
Relazione ferramonti1
Relazione ferramonti1Relazione ferramonti1
Relazione ferramonti1
 
Ppt school
Ppt schoolPpt school
Ppt school
 
Jews
JewsJews
Jews
 
Jews before world war ii, k. chabinska, l.kokot
Jews before world war ii, k. chabinska, l.kokotJews before world war ii, k. chabinska, l.kokot
Jews before world war ii, k. chabinska, l.kokot
 
Event dunia
Event duniaEvent dunia
Event dunia
 
Arch hasan fathi
Arch hasan fathiArch hasan fathi
Arch hasan fathi
 
Juliusz slowacki secondary school in czestochowa, poland
Juliusz slowacki secondary school in czestochowa, polandJuliusz slowacki secondary school in czestochowa, poland
Juliusz slowacki secondary school in czestochowa, poland
 
Aev school presentation
Aev   school presentationAev   school presentation
Aev school presentation
 
PASAR
PASARPASAR
PASAR
 
Matechef 2
Matechef 2Matechef 2
Matechef 2
 
Gravitation theory
Gravitation theoryGravitation theory
Gravitation theory
 
Thesis Defense Exam Presentation
Thesis Defense Exam PresentationThesis Defense Exam Presentation
Thesis Defense Exam Presentation
 
Mε τους δώδεκα θεούς από το χθες στο σήμερα(πολιτιστικό πρόγραμμα γ΄δημοτικού)
Mε τους δώδεκα θεούς από το χθες στο σήμερα(πολιτιστικό πρόγραμμα γ΄δημοτικού)Mε τους δώδεκα θεούς από το χθες στο σήμερα(πολιτιστικό πρόγραμμα γ΄δημοτικού)
Mε τους δώδεκα θεούς από το χθες στο σήμερα(πολιτιστικό πρόγραμμα γ΄δημοτικού)
 

Similar to Step4 managementsendsorderw

A Novel Secure Cloud SAAS Integration for User Authenticated Information
A Novel Secure Cloud SAAS Integration for User Authenticated InformationA Novel Secure Cloud SAAS Integration for User Authenticated Information
A Novel Secure Cloud SAAS Integration for User Authenticated Information
ijtsrd
 
Angular - Chapter 4 - Data and Event Handling
 Angular - Chapter 4 - Data and Event Handling Angular - Chapter 4 - Data and Event Handling
Angular - Chapter 4 - Data and Event Handling
WebStackAcademy
 
MVC Pattern. Flex implementation of MVC
MVC Pattern. Flex implementation of MVCMVC Pattern. Flex implementation of MVC
MVC Pattern. Flex implementation of MVC
Anton Krasnoshchok
 
Strigil - lightning talks
Strigil - lightning talksStrigil - lightning talks
Strigil - lightning talks
zviri
 
Aspmvc
AspmvcAspmvc
Aspmvc
durai arasan
 
Sql Portfolio
Sql PortfolioSql Portfolio
Sql Portfolio
Shelli Ciaschini
 
CAD Report
CAD ReportCAD Report
CAD Report
Jyoti Tyagi
 
Product Analysis Oracle XML Gateway
Product Analysis Oracle XML GatewayProduct Analysis Oracle XML Gateway
Product Analysis Oracle XML Gateway
AcevedoApps
 
Prabhu-Software-Engineer-3+-Year-Exp
Prabhu-Software-Engineer-3+-Year-ExpPrabhu-Software-Engineer-3+-Year-Exp
Prabhu-Software-Engineer-3+-Year-Exp
Prabhu S
 
Seminar presentation 05042011_v7_with_cl
Seminar presentation 05042011_v7_with_clSeminar presentation 05042011_v7_with_cl
Seminar presentation 05042011_v7_with_cl
miket60
 
Surya_CV
Surya_CVSurya_CV
Surya_CV
Surya Pal
 
Web Based Investment Management System
Web Based Investment Management SystemWeb Based Investment Management System
Web Based Investment Management System
Mike Taylor
 
icv
icvicv
LMKT Microsoft Solutions and Services
LMKT Microsoft Solutions and Services LMKT Microsoft Solutions and Services
LMKT Microsoft Solutions and Services
LMKT Private Limited
 
Assignment3 pp v3
Assignment3 pp v3Assignment3 pp v3
Assignment3 pp v3
zanmmit
 
AvinashBhat_Resume
AvinashBhat_ResumeAvinashBhat_Resume
AvinashBhat_Resume
Avinash Bhat
 
C# .NET Developer Portfolio
C# .NET Developer PortfolioC# .NET Developer Portfolio
C# .NET Developer Portfolio
cummings49
 
Microservices in AUTO1 by Alexander Egurtsov
Microservices in AUTO1 by Alexander EgurtsovMicroservices in AUTO1 by Alexander Egurtsov
Microservices in AUTO1 by Alexander Egurtsov
The Business Transformation Network
 
zaid ppt.pptx
zaid ppt.pptxzaid ppt.pptx
zaid ppt.pptx
aasim40
 
AngularJs Workshop SDP December 28th 2014
AngularJs Workshop SDP December 28th 2014AngularJs Workshop SDP December 28th 2014
AngularJs Workshop SDP December 28th 2014
Ran Wahle
 

Similar to Step4 managementsendsorderw (20)

A Novel Secure Cloud SAAS Integration for User Authenticated Information
A Novel Secure Cloud SAAS Integration for User Authenticated InformationA Novel Secure Cloud SAAS Integration for User Authenticated Information
A Novel Secure Cloud SAAS Integration for User Authenticated Information
 
Angular - Chapter 4 - Data and Event Handling
 Angular - Chapter 4 - Data and Event Handling Angular - Chapter 4 - Data and Event Handling
Angular - Chapter 4 - Data and Event Handling
 
MVC Pattern. Flex implementation of MVC
MVC Pattern. Flex implementation of MVCMVC Pattern. Flex implementation of MVC
MVC Pattern. Flex implementation of MVC
 
Strigil - lightning talks
Strigil - lightning talksStrigil - lightning talks
Strigil - lightning talks
 
Aspmvc
AspmvcAspmvc
Aspmvc
 
Sql Portfolio
Sql PortfolioSql Portfolio
Sql Portfolio
 
CAD Report
CAD ReportCAD Report
CAD Report
 
Product Analysis Oracle XML Gateway
Product Analysis Oracle XML GatewayProduct Analysis Oracle XML Gateway
Product Analysis Oracle XML Gateway
 
Prabhu-Software-Engineer-3+-Year-Exp
Prabhu-Software-Engineer-3+-Year-ExpPrabhu-Software-Engineer-3+-Year-Exp
Prabhu-Software-Engineer-3+-Year-Exp
 
Seminar presentation 05042011_v7_with_cl
Seminar presentation 05042011_v7_with_clSeminar presentation 05042011_v7_with_cl
Seminar presentation 05042011_v7_with_cl
 
Surya_CV
Surya_CVSurya_CV
Surya_CV
 
Web Based Investment Management System
Web Based Investment Management SystemWeb Based Investment Management System
Web Based Investment Management System
 
icv
icvicv
icv
 
LMKT Microsoft Solutions and Services
LMKT Microsoft Solutions and Services LMKT Microsoft Solutions and Services
LMKT Microsoft Solutions and Services
 
Assignment3 pp v3
Assignment3 pp v3Assignment3 pp v3
Assignment3 pp v3
 
AvinashBhat_Resume
AvinashBhat_ResumeAvinashBhat_Resume
AvinashBhat_Resume
 
C# .NET Developer Portfolio
C# .NET Developer PortfolioC# .NET Developer Portfolio
C# .NET Developer Portfolio
 
Microservices in AUTO1 by Alexander Egurtsov
Microservices in AUTO1 by Alexander EgurtsovMicroservices in AUTO1 by Alexander Egurtsov
Microservices in AUTO1 by Alexander Egurtsov
 
zaid ppt.pptx
zaid ppt.pptxzaid ppt.pptx
zaid ppt.pptx
 
AngularJs Workshop SDP December 28th 2014
AngularJs Workshop SDP December 28th 2014AngularJs Workshop SDP December 28th 2014
AngularJs Workshop SDP December 28th 2014
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 

Step4 managementsendsorderw

  • 1. SENIOR PROJECT 2007-2008 (Step#4 of the ekoSign project) 8. Management Sends Order to the Warehouse Developing Application that Uses XML Signatures Project team members Hüseyin Çakır, Mehmet Mesut Özışık, Yılmaz Kaya Abstract: Fourth step of the application which is management sends order to the warehouse. This phase includes XML document signatures, encryption of informations at XML, verifying XML signatures and decrypting encrypted XML data. Keywords: Management sends order to the warehouse, XML Signature and Encryption. http://groups.google.com/group/digitalsignature digitalsignature@googlegroups.com PRINT DATE: 05/06/08 1
  • 2. 8.1 Introduction This documentation is related with the construction phase of the project. Management sends order to the warehouse is one of the parts of construction phases and the series of iterations of the system are implemented and an executable release of the step is developed. The implementation of this step is built according to the use case diagrams and use case by text. Figure 8.1 shows the steps of the unified process and which step the project plan paper belongs to. Inception 1.Introduction 2.Project Plan 3.Basic Concepts Elaboration 4.Scenario Construction Transition 5.CSorder 6.SDSorderW 7.SDSorderM 8.MSorderW Figure 8.1 Steps of Unified Process. 8.2 Management Sends Order to the Warehouse Management receives an order from SD indicating that 1500 units of product worth of 100000$ are needed on 21.02.2008 at 10:00. Since the cost of order is higher than 50000$, management is authorized to sign order and send to the Warehouse (Figure 8.2). Figure 8.2 Scenario. 2
  • 3. SIGNATURES: CUSTOMER, SALES DEPARTMENT, MANAGEMENT 1500 units of product worth of 100000$ are needed on 21.02.2008 at 10:00. XML DOCUMENT THAT CUSTOMER SENDS TO THE SALES DEPARTMENT: A sample XML includes customer's signature, sales department signature, management signature and encrypted order information. <order> <!-ENCRYPTED ORDER INFORMATION--> <EncryptedData xmlns="http://www.w3.org/2001/04/xmlenc#" Encrypted Customer Order Type="http://www.w3.org/2001/04/xmlenc#Element"> <EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#aes256-cbc" /> <KeyInfo xmlns="http://www.w3.org/2000/09/xmldsig#"> <EncryptedKey xmlns="http://www.w3.org/2001/04/xmlenc#"> <EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#rsa-1_5" /> <KeyInfo xmlns="http://www.w3.org/2000/09/xmldsig#"> <KeyName>rsaKey</KeyName> </KeyInfo> <CipherData> <CipherValue>NpXleAAvjsx/afFGVFM3jKDk/Dj2prknl1eXcf7+gveP7+2pa26ILGlAPV0NTFLkQxTwHSfhk V4y0PMr7xPNQ9a8qNcsN7MPSl45OoTE0l7yJD5jD0462rlXmCwEVdgZi3Oi0LA2dto/SxCSKicxbiBIeZl1iWctRo WfkrzgKkw=</CipherValue> </CipherData> </EncryptedKey> </KeyInfo> <CipherData> <CipherValue>gn4aaCOi/5P2+k5HHJ2vzMltSXt6O2+SMiNXFCn8mq/fHvRxwqqSBeejPiEpI4iXg/u0AhKz2jlN EPqbnMB17EfT81DiW5VYAPssA8NM +cmdccTotWtj32EnOqIJNVsanPl4i/RsXFwL6a7K2YIHe6l0Tewwyj3ZWSSzHbq1c2GsGi0qBAXe1vsRrDr1cmW/C rbJDW70YzMuoVS8IysYgm9n96Wo/dTyaGPl+fG +Cs5KAZyDZRRSP9CXDJ38WZGGRfdQCnvhf8ztG8CuB9mruK56mtjz9rV3HkqM2etLDzcbXmkeyAErSJrS4W5n zw7NkbZOMht2JdTN+XhcTrS2GA==</CipherValue> </CipherData> </EncryptedData> <!-SALES DEPARTMENT MESSAGE--> <salesDept Id="s">Cost is higher than 50000$, the confirmation management.</salesDept> <!-MANAGEMENT MESSAGE--> <management Id="m">1500 units of product is required.</management> <!-SIGNATURE OF CUSTOMER--> needed from <Signature xmlns="http://www.w3.org/2000/09/xmldsig#"> <SignedInfo> <CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315" /> <SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1" /> Signature #1: Customer <Reference URI="#c"> <Transforms> <Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature" /> </Transforms> <DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1" /> <DigestValue>VSh4kpOimvsxdy2hpfnozUZrL+Q=</DigestValue> </Reference> </SignedInfo> <SignatureValue>ScVHcqcvXt3/mfB6CVKOGG5DcFvt/30Cc9LwabCpebDCHiXtA +bsx6AUnd1c9g6VPxrgClynopWqd9fQYBNy7e1DzOnLSn/Ya8Bzfe3SaMsTS7Xw8jmJRjTMJEsWGrEX1d/zdpa4s 5H4A0i5FNXDlrXkhO3NpS5bffD1C9CJIjw=</SignatureValue> </Signature> 3
  • 4. <!-SIGNATURE OF SALES DEPARTMENT--> <Signature xmlns="http://www.w3.org/2000/09/xmldsig#"> <SignedInfo> Signature #2: Sales Dept. <CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315" /> <SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1" /> <Reference URI="#s"> <Transforms> <Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature" /> </Transforms> <DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1" /> <DigestValue>cLYt4vVedV3M6Pu+/WX1uuf/K58=</DigestValue> </Reference> </SignedInfo> <SignatureValue>IRIhYrEwZKQcJikufCfnL0st1l7SBrZtxsq+jaJ8jP/l3yiv1MkeAkzmpH2t+RAhbG1BB +iwjenI2IvPJRbkejj4woBtNSSNJ+VFOh9KgC3BEgJy8BQ6ub76cThLgMJ +u0TuuyjBGGDcdRt8HJpIs7WBFLyErmPGHG5s6XieZL0=</SignatureValue> </Signature> <!-SIGNATURE OF MANAGEMENT--> <Signature xmlns="http://www.w3.org/2000/09/xmldsig#"> <SignedInfo> Signature #3: Manegement <CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315" /> <SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1" /> <Reference URI="#m"> <Transforms> <Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature" /> </Transforms> <DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1" /> <DigestValue>orNVV1C8Ckyz3XNuGxF/Qz2wjY4=</DigestValue> </Reference> </SignedInfo> <SignatureValue>Yukm1rqP219Cw17HFPGikqBj +LWvJyrvYhBr4dcUzecDdveqTCSmqpqKzEbSo8ITPlPuRIvhMJdJ9ImuM/Bbt7zvFHl48SqNqVtsFoEb +DUXhd8uM9JnmF/SPwghHYCNneXGBB6mA+TVugDaZ3Jjxs869DCu8+zgo9TIoFeiPaQ=</SignatureValue> </Signature> </order> Table 8.1 Management Sends Sample XML Order to Warehouse. 4
  • 5. 8.3 Use Case Diagram of Management Sends Order to Warehouse Figure 8.3 represents Management sending the document to the warehouse and Use case text of the diagram is shown in Figure 8.4. Use Case Title Figure 8.3 Use Case Diagram of Management sending order. :Management sending order to the warehouse Primary Actor :Management Precondition :Management must validate the previous signatures Success Guarantee :Company Policy applied and order sent to the authorized department Trigger :Management receives order from sales department Main Success Scenario: 1. Page loaded to the management staff computer. 2. Management verifies the company policy. 3. After validation the order will be sent to the warehouse. Figure 8.4 Use Case by Text for Management Sends Order. 5
  • 6. 8.4 Class Diagram of Sales Department Applies Policy and Sends Order This step uses six classes which are “signature”, “verifySignature”, “encryption”, “decryption”, “customer” and “order”. “signature” class includes a method “SignXml” that sign XML document and attach the signature to the document in a <Signature> element. The method creates an cryptographic signing key, adds the key to a secure key container, and then uses the key to digitally sign an XML document. The key can then be retrieved to verify the XML digital signature, or be used to sign another XML document. “encryption” class has a method “Encrypt” that encrypts an XML element using two keys. It generates a cryptographic public/private key pair and saves the key pair to a secure key container. The method then creates a separate session key using a cryptographic algorithm. The method uses the session key to encrypt the XML document and then uses the public key to encrypt the session key. Finally, the method saves the encrypted session key and the encrypted XML data to the XML document within a new <EncryptedData> element. “customer” class stores two different attributes and “order” class that stores four different attributes that is used to get data from the user interface. This class's attributes encrypted by “Encryption” class that uses “encrypt” method to safely send data to the Company Sales Department. Figure 8.5 Class Diagram of Sales Department Receives Order and Applies Policy . 6
  • 7. 8.5 Sequence & Collaboration Diagrams of Management Sends Order to the Warehouse Sequence Diagram shows the interactions between objects to perform critical pieces of use case behavior in time-ordered manner. Sequence Diagram for Step#1 of the project developed in Figure 8.6 is developed from the class diagram in Figure 8.5. Figure 8.6 Sequence Diagram of Management Sends Order to the Warehouse. 7
  • 8. Collaboration Diagram that shows the interactions between objects to perform critical pieces of the use case behavior is developed in Figure 8.7. Figure 8.7 Collaboration Diagram of Management Sends Order to the Warehouse. 8
  • 9. 8.6 User Interfaces Figure 8.8 represents an interface that is used by management staff to view and send orders to the warehouse. Figure 8.8 Management Interface for Displaying Orders Received. 9