期刊文献+

基于SAML的安全技术在电子商务中的应用 被引量:3

Application of E-Business With A Security Technology Based on SAML
原文传递
导出
摘要 论文首先简要介绍了增强Web服务安全性的新技术,然后提出一种基于Web服务的电子商务应用模型,并分析了该模型的安全需求,最后针对这些安全需求提出了用SAML技术来实现安全电子商务的方法。 New technologies help you make your Web Services more secure. This paper proposes one kind of Ebusiness application model based on the Web Services and analyses the security requirements for this model. Finally, aiming at these security requirements, the implementation of security E-business with the SAML technology is proposed.
出处 《信息安全与通信保密》 2007年第5期101-103,共3页 Information Security and Communications Privacy
关键词 WEB服务 SOAP XML SAML 电子商务 安全 Web services SOAP XML SAML E-business security
  • 相关文献

参考文献5

二级参考文献10

  • 1Steve Vinoski. Web services interaction models[J]. Current practice. Internet Computing, IEEE, 2002, 6(3): 89 -91.
  • 2Erich Gamma. Design patterns: Elements of reusable objectoriented software[Z]. ISBN: 0201633612). Addison-Wesley,1995-01.
  • 3Kim Topley. Java web service in nutshell[Z]. O'Reilly, 2003-06.
  • 4OASIS Security Services TC. OASIS [EB/OL]. www. oasisopen.org/committees/tc_home.php? wg_abbrev=security.
  • 5Curbera F, Duftler M, Khalaf R, et al. Unraveling the web services web: An introduction to SOAP, WSDL, and UDDI[J]. Internet Computing, IEEE, 2002, 6 (2): 86 -93.
  • 6W3C. XML Encryption Requirements[ EB/OL]. http://www.w3. org/TR/xml - encryption - req, 1999 - 10.
  • 7W3C. XML - Signature Requirements[ EB/OL]. http://www.w3. org/TR/xmldsig- requiremenis. 1999 - 10.
  • 8Kreger H. Web Services Conceptual Architecture(WSCA 1.0)Part Ⅲ[EB/OL]. http://www - 900. cn. ibm. ct, m/develop-erWorks/cn/webservices/ws - wsca/part3/index, shtml, 2002- 04.
  • 9CoyleFP 袁勤勇 莫青译.XML,Web服务和数据革命[M].北京:清华大学出版社,2003..
  • 10International Business Machines Corporation(IBM). Web Ser vices Security (WS- Security) [EB/OL]. http://www, ibm.com/developerworks/library/ws - secure/. 2000 - 05.

共引文献38

同被引文献32

  • 1张慧,李建华,马华.一种基于SAML的Web服务单点登录模型研究与实现[J].计算机系统应用,2008,17(7):49-52. 被引量:8
  • 2顾晓燕.VLAN技术及在校园网中的实现[J].电脑与电信,2006(12):76-78. 被引量:17
  • 3Sun Microsystelns, Inc. Sun OpenSSO Enterprise 8.0 Technical Overview[EB/OL].(2008-11-01 )[2009-06-01]. http: //docs.sun.com/app/docs/doc/820-3740.
  • 4Maler Eve, Reed Drummond. The Venn of Identity -Options and Issues in Federated Identity Management[J]. Security&Privacy, IEEE, 2008, 06 ( 02 ). 16-23.
  • 5David Hunter. Microsoft CardSpace interop with OpenID announced at RSA[EB/OL].(2007-02-06) [2009-06-01]. http: //www.hunterstrat.com/ news/microsoft-cardspace-interop-with-openid- announced-at-rsa.
  • 6projectliberty.org. Now More Than One Billion Liberty-enabled Devices and Identities[EB/OL]. [2009-06-01]. http: //www.projectliberty.org/ liberty/adoption.
  • 7refeds.terena.org. Survey as a table[EB/OL]. [2009- 06-01]. https: //refeds.terena.org/index.php/ Federations.
  • 8shibboleth.internet2.edu. About CARSI-Fed/ CERNET-Fed[EB/OL]. [2009-06-01]. http: // shibboleth.edu.cn/.
  • 9shibboleth.internet2.edu. Shibboleth[EB/0L]. [2009- 06-01]. http: //shibboleth.internet2.edu/.
  • 10OpenSSO.dev.java.net. OpenSSO[EB/0L]. [2009- 06-01]. https: //opensso.dev.java.net/public/ about/faqcenter/faqoverview.html.

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部