期刊文献+

基于.NET的SOAP加密方法研究与实现 被引量:5

Research and Realization for SOAP Encryption Techniques Based on NET
下载PDF
导出
摘要 本文首先从数据加密性能方面讲述可以利用公钥体制部分加密SOAP消息的方法,在此基础上提出一种利用Web Services架构高数据同步性系统的解决方案,并在性能和可行性上对方案进行了比较详细的分析。实验证明该方案是可行的。 This paper discusses the method of encrypting SOAP messages partially using public key at first. Then using Web services architecture,a high data synchronization solution is presented. The performance and feasibility about this method are analyzed detailedly. The experimental result shows that this method is feasible.
出处 《计算机科学》 CSCD 北大核心 2005年第8期52-54,共3页 Computer Science
  • 相关文献

参考文献6

  • 1柴晓路.为什么需要Web服务[J].IBM developerWorks专刊,2003,.
  • 2King S. CLSSP,threat and Solutions to Web Services Security.Network Security,2003,9:8~11.
  • 3Wahlin D. XML for ASP.NET Developers.SAMS,2001.
  • 4柴晓路.SOAP Header扩展:WS-Routing和WS-Referral,IBM Corporation,2001.http:∥www-900.ibm.com/developerWorks/cn/webservices/ws-soapheadext/part2/index.shtml.
  • 5张勇,冯东雷,陈涵生,白英彩.Internet密钥交换协议的安全缺陷分析[J].软件学报,2002,13(6):1173-1177. 被引量:2
  • 6刘怡文,李伟琴.密码协议的分层安全需求及验证[J].北京航空航天大学学报,2002,28(5):589-592. 被引量:5

二级参考文献12

  • 1[1]Roscoe A W. Intensional specifications of security protocols[A]. In: Guttman J, ed. Proceedings of 9th IEEE Computer Security Foundations Workshop[C]. Los Alamitos: IEEE Computer Society, 1996. 28~38.
  • 2[2]Boyd C. Towards extensional goals in authentication protocols[J/OL].http://dimacs.rutgers.edu/workshops/security/program2/program.html,1997.
  • 3[3]Paulson L C. The inductive approach to verifying cryptographic protocols[J]. Journal of Computer Security, 1998, 6(1/2): 85~128.
  • 4[4]Abadi M, Tuttle M R. A semantics for logic of authentication[A]. In: Proceedings of the 10th ACM Symposium on Principles of Distributed Computing[C]. New York: ACM Press, 1991. 201~216.
  • 5[5]Meadows C. A model of computation for the NRL protocol analyzer[A]. In: Gong L, ed. Proceedings of Computer Security Foundations Workshop VII[C].Los Alamitos: IEEE Computer Society Press, 1994. 84~89.
  • 6[6]Syverson P F. Adding time to a logic of authentication[A]. In: Sandhu R, ed. Proceedings of the First ACM Conference on Computer and Communications Security[C]. New York: ACM Press, 1993. 97~101.
  • 7Harkings, D., Carrel, D. The Internet key exchange (IKE). RFC 2409, 1998.
  • 8Zhou, Jian-ying. Fixing of security flaw in IKE protocols. Electronics Letters, 1999,35(13):1072~1073.
  • 9Maughan, D., Schertler, M., Schneider, M., et al. Internet Security Association and key management protocol (ISAKMP). RFC 2408, 1998.
  • 10Orman, H. The Oakley key determination protocols. RFC2412, 1998.

共引文献5

同被引文献64

引证文献5

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部