期刊文献+

基于XML协议的实时信息传输策略 被引量:1

Real-time Information Communication Strategy Based on XML Protocol
下载PDF
导出
摘要 结合实时信息的重要性和XML协议的特点,提出用XML协议实现信息系统中实时信息传输的策略。以交通实时信息为例介绍了XML协议的内容、信息传输策略和信息压缩等。实践证明基于XML协议的实时信息传输策略具有通信协议标准化、交互性强、通信方式多样性、断点续传方式多样性和公共服务便捷性等特点,为信息系统中各种实时信息的传输探索了一条新路。 Taking together the significance of real-time information and the characteristics of XML protocol, the paper proposes the strategy to realize real-time information communication within an information system through XML protocol Traffic real-time information is presented as an example to manifest the protocol content, communication strategy and information compression of the XML protocol. Practical application verifies its capability in ensuring the standardization of communication protocols, the reciprocity and diversity of communition modes, the realization of broken-point transfers and the facilitation of public services.
出处 《物流技术》 2010年第5期132-134,共3页 Logistics Technology
关键词 信息传输 XML协议 实时信息 information communication XML protocol real-time information
  • 相关文献

参考文献5

二级参考文献22

  • 1李斓,何永忠,冯登国.面向XML文档的细粒度强制访问控制模型[J].软件学报,2004,15(10):1528-1537. 被引量:41
  • 2祝胜林,林丕源,肖德琴.基于XML数字签名在高校成绩管理中的应用[J].计算机工程与应用,2005,41(26):227-229. 被引量:3
  • 3王斌.一种身份认证协议的形式化描述与验证[J].甘肃科技纵横,2007,36(2):18-18. 被引量:1
  • 4DAMIANI E, FANSI M, GABILLON A, et al. A general approach to securely querying XML [ J]. Computer Standards and Interfaces,2008, 30(6) : 379 - 389.
  • 5DUONG M, ZHANG Y. An integrated access control for securely querying and updating XML data [ C]// Proceedings of the 19th Conference on Australasian Database. Darlinghurst, Australia: Australian Computer Society, 2008:75-84.
  • 6DAMIANI E, De CAPITANI di VIMERCATI S, PARABOSCHI S, et al. A fine-grained access control system for XML documents [ J]. ACM Transactions on Information and System Security, 2002, 5 (2) : 169 -202.
  • 7DUONG M, ZHANG Y. LSDX: A new labeling scheme for dynamically updating XML data [ C]//Proceedings of the 16th Australasian Database Conference. Darlinghurst, Australia: Australian Computer Society, 2005:185 - 193.
  • 8ZHAO G S, CHADWICK D W. On the modeling of Bell-LaPadula security policies Using RBAC [ C]// Proceedings of the 17th IEEE International Workshops on Enabling Technologies. Los Alamitos, CA: IEEE Computer Science, 2008:257-262.
  • 9DAMIANI E, FANSI M, GABILLON A, et al. Securely updating XML [ J]. KES 2007: Proceedings of the 1 lth International Conference on Neural Networks, LNCS 4694. Berlin: Springer-Verlag, 2007:1098 - 1106.
  • 10MASSACCI F, MYLOPOULOS J, ZANNONE N. Hierarchical hippocratic databases with minimal disclosure for virtual organizations [ C]// Proceedings of the 12th ACM Conference on Computer and Communications Security in Computer Security. Heidelberg: Springer, 2005:438-454.

共引文献10

同被引文献3

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部