期刊文献+

基于XML安全的加密数据库中的数据交换 被引量:2

Data exchange in encrypted database based on XML security
下载PDF
导出
摘要 随着Internet技术的迅速发展,数据库中敏感数据的安全性问题也随之引起人们的重视.该文基于XML加密的思想,给出了一套传递加密数据库中的密文及其相关解密信息的标记,并且设计了加密数据库和XML文档之间的映射规则,最后给出了一个基于XML的加密数据库的数据交换模型. With the rapid advances in Internet technologies, many companies rely on the service of database provided by a third party. It's necessary for them to encrypt their data in remote servers. Due to the difficulties of the direct exchange among different systems, this paper provides a set of rules to map the encrypted records into XML documents. These rules are based on XML Encryption. We also give an example to demonstrate the feasibility.
出处 《广州大学学报(自然科学版)》 CAS 2005年第1期54-57,共4页 Journal of Guangzhou University:Natural Science Edition
关键词 加密数据库 XML加密 数据交换 encrypted database XML encryption data exchange
  • 相关文献

参考文献4

  • 1[美]CharlesFGoldfarb PaulPreseod 张晓晖译.XML手册[M].北京:电子工业出版社,2003..
  • 2W3C Candidate Recommendation 02 August 2002. XML encryption syntax and processing[ EB/OL]. http://www, w3. org/TR/2002/CRxmlenc-core-20020802/.
  • 3[美]BlakeDoumaee 周永彬译.XML安全基础[M].北京:清华大学出版社,2003..
  • 4Hakan Hacigumus, Bala Iyer, Chen Li, et al. Executing SQL over encrypted data in the database-service-provider model[A].ACM SIGMOD Conference on Management of Data (SIGMOD 2002)[C], 2002.

同被引文献16

  • 1孙雄英,郭颂.基于XML安全技术的算法实现[J].微机发展,2005,15(7):152-154. 被引量:1
  • 2孟健,曹立明,王小平,姚亮.XML文档的加密访问控制与传输[J].计算机应用,2006,26(5):1061-1063. 被引量:7
  • 3马仲海,苏金林.基于SOAP的XML安全加密技术研究[J].西北民族大学学报(自然科学版),2005,26(4):59-63. 被引量:1
  • 4朱虹,邹凯.一种XML文档访问控制系统的设计和实现[J].计算机工程与应用,2006,42(20):160-163. 被引量:1
  • 5Damiani E,Vimercati S C,Paraboschi S,et al. A fine grained access control system for XML documents [ J ]. ACM Trans on Information and System Security ( T/SSEC ), 2002, 5 ( 2 ) : 169-202.
  • 6Satoshi Hada, Micltiharu Kudo. XML Access Control Language: Provisional Authorization for XML Documents [ EB/ OL]. http://www, trl. ibm. co. jp/projects/xml/xacl/,2002- 08-14.
  • 7Eastlake D, Reagle J. XML Encryption Syntax and Processing, W3C Recommendation [ EB/OL ]. http://www, w3. org/TR/xmlenc-core/,2002-10-10.
  • 8Bilal Siddiqui. Demonstrating the Secure Exchange of Structured Data [ EB/OL]. http://www. 900. cn. ibm. com/developerWorks/cn/xml/x-encrypt/index, shtml,2006-114)1.
  • 9Giovanni Guardalben,Shaku Atre Integration of XML and Relational Database Technologies.http://www.hitsw.com
  • 10Mike Downen,Shawn Farkas Exchange Data More Securely with XML Signatures and Encryption.http://msdn.microsoft.com/msdnmag/issues/04/11/XMLSignatures/default.aspx

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部