期刊文献+

基于XML应用集成安全模型设计 被引量:3

A Secure Model Design Based on XML Application Integration
下载PDF
导出
摘要 应用对称密码、非对称密码技术和组件思想构建安全组件,在安全组件的基础上构建保护W eb数据传输的安全模型,这种安全模型具有易维护和易扩展的优点。在这种安全模型下通过XML能够构建平台独立的具有数据传输和存储安全的应用集成系统,该模型可用于解决基于W eb服务的电子商务、电子政务等应用集成环境的安全问题。 Secure components are designed based on component, symmetric encryption and public-key technology. Secure transmission model for Web server is also designed using secure components, which is maintained and extended easily. Application integration system with data transmission and save security can be built on a platform independent environment by XML messaging under the secure component model. The secure component model may protect electronic commerce and electronic government data security.
出处 《计算机应用研究》 CSCD 北大核心 2005年第11期122-124,127,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(10271042) 广州市属高校2004年度科技计划资助项目(2003)
关键词 组件 XML 加密 数字签名 会话密钥 Component XML(eXtensible Markup Language) Encrypt Digital Signature Session Key
  • 相关文献

参考文献12

  • 1Extensible Markup Language(XML) 1.0[EB/OL]. W3C Recommendation. http://www.w3.org/TR/1998/REC-xml-19980210,1998.
  • 2Eastlake D, Reagle J, Imamura T. XML Encryption Syntax and Processing[EB/OL].W3C Working Draft. http://www.w3.org/TR/xmlenc-core/,2001.
  • 3AES Home Page[EB/OL]. FIPS 197. http://csrc.nist.gov/encryption/aes/,2001.
  • 4Douglas R Stinson. Cryptography Theory and Practice(2nd Edition)[M]. CRC-Press, 2002.114-116.
  • 5Eastlake D, Reagle D, Solo D. XML-Signature Syntax and Proces-sing,RFC 3075[EB/OL]. http://www.w3.org/TR/xmldsig-core/,2002-02.
  • 6Barkley JF, Kuhn R, Rosenthal LS. Role-based Access Control for the Web[EB/OL]. http://csrc.nist.gov/rbac/cals-paper.html,1996.
  • 7Kudo, Hada. XML Document Security Based on Provisional Authorization[C]. Athens:Proceedings of the 7th ACM Conference on Computer and Communications Security, 2000.87-96.
  • 8Secure Hash Standard Specification (SHA-1)[EB/OL]. FIPS PUBS 180-1, http://www.itl.nist.gov/fipspubs/fip180-1.htm,1995-04.
  • 9Charlie Kaufman. Internet Key Exchange Protocol[EB/OL]. http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ikev2-04.txt, 2003-01.
  • 10Feng Bao. Steganography by Communication Protocols[C]. ChinaCrypt'2004, Beijing:China Science Press, 2004.334-344.

同被引文献13

  • 1刘松,付晓江.面向服务的企业应用集成架构[J].吉林大学学报(信息科学版),2005,23(6):657-663. 被引量:39
  • 2刘小览,许敏佳.基于XML的网络安全技术[J].计算机工程,2006,32(2):164-166. 被引量:7
  • 3Blake Dournaee.XML安全基础[M].北京:清华大学出版社,2002.
  • 4BEA. Domain model for SOA[EB/OL].[2008-09-08]. Apil www. bea. com.
  • 5Alex Selkirk,XML and security,BT Technol J Vol 19 No 3 July 2001
  • 6MARY ANNE PATTON,AUDUN JOSANG,Technologies for Trust in Electronic Commerce,Electronic Commerce Research,21(2004)
  • 7Comp-U-Learn Tech India Ltd.XML核心技术[M].贾素玲,王强,译.北京:高等教育出版社,2005.
  • 8Alex Selkirk. XML and security [J]. BT Technol. 2001, 7(3) : 23- 34.
  • 9Mary Anne Pation, Audun Josang. Technologies for Trust in Electronic Commerce[J]. Electronic Commerce Research. 2004, 4:9 - 21.
  • 10刘通,张亚男.基于Xfire的分布式Java Web Services的应用[J].长春工业大学学报,2008,29(2):183-187. 被引量:5

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部