期刊文献+

一种应用集成安全模型设计 被引量:2

A secure design based on application integration
下载PDF
导出
摘要 应用对称密码、非对称密码技术和组件思想构建安全组件,在这些安全组件的基础上构建保护Web数据传输的安全模型,这种安全模型具有易维护和易扩展的优点.在这种安全模型下通过XML能够构建平台独立的具有数据传输和存储安全的应用集成系统,该模型可以用于解决基于Web服务的电子商务、电子政务等应用集成环境的安全问题. Secure components are designed based on component, symmetric encryption and public-key technology. Secure transmission model for Web server is also designed by using secure components, which is maintained and extended easily. Application integration system with data transmission and save security can be built on a platform independent environment by XML messaging under the secure component model. The secure component model may protect electronic commerce and electronic government data security.
作者 周权
出处 《广州大学学报(自然科学版)》 CAS 2005年第3期209-214,共6页 Journal of Guangzhou University:Natural Science Edition
基金 广东省教育厅自然科学研究资助项目(Z03001)
关键词 组件 XML 加密 数字签名 会话密钥 <Keyword>component Xtensible Markup Language encryption digital signature session key
  • 相关文献

参考文献12

  • 1Extensible markup language(XML) 1.0[EB/OL]. http://www.w3.org/TR/1998/REC-xml-19980210,2003 - 05.
  • 2Eastlake D, Reagle J,Imamura T. XML encryption syntax and processing[EB/OL]. At URL: http://www.w3.org/TR/xmlenccore/, 2003-12.
  • 3AES home pape EIPS 197[EB/OL].http://csre.nist.gov/eneryption/ase/.2001-02-28.
  • 4Douglas R. Stinson. Cryptography theory and practice(Second Edition) [M]. USA : CRC Press, 2002. 114 - 116.
  • 5Eastlake D, Reagle D, Solo D. XML-Signature syntax and processing[EB/OL]. http://www.w3.org/TR/xmldsig-core/,2002-02.
  • 6Barkley JF, Kuhn R, Rosenthal LS. Role-based access control for the Web[EB/OL]. http://csrc.nist.gov/rbac/cals-paper.html, 2004-05.
  • 7Kudo, Hada. XML document security based on provisional authorization[A]. Proceedings of the Seventh ACM Conference on Computer and Communications Security[C]. New York, NY, USA: ACM Press, 2000. 87- 96.
  • 8Secure hash standard specification ( SHA-1 ) FIPS PUBS 180-1[EB/OL]. http://www.itl. nist. gov/fipspubs/fip180-1.htm,1995-04
  • 9Charlie Kaufman. Internet key exchange protocol[EB/OL]. http://www. ietf.org/internet-drafts/draft-ietf-ipsec-ikev2-04, txt,2003 - 03.
  • 10Feng Bao. Steganography by communication protocols[A]. China Crypt'2004[C]. Beljing: Science Press, 2004. 334-344.

同被引文献24

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部