Font Size: a A A

Research And Application Of Secure Data Exchange Based On XML

Posted on:2011-02-16Degree:MasterType:Thesis
Country:ChinaCandidate:Q LiuFull Text:PDF
GTID:2178360302973635Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
XML is the World Wide Web Consortium to develop a data standard, which has a structured, interoperability, strong, easy to exchange and scalability characteristics in many industries has been widely used, is becoming the corporate and enterprise data exchange between the first choice, with extensive use of XML, XML data security is also increasingly becoming important, such as data confidentiality, integrity, authenticity, non-repudiation and so on. How the non-security, secure data sent over the Internet, which is the purpose of writing this paper and solve problems:First, the analysis of XML data security problems and proposed solutions as well as the XML security technology research at home and abroad the status quo. Introduced the field of cryptography encryption technology, digital signature technology and XML key management techniques.Second, an overview of the syntax of XML as well as the structure of XML documents constitute the inseparable; describes the traditional format to XML format conversion, as well as the interaction between the database and XML conversion and use of the database import and export functions will lead to other data formats into the database, and then to operate. Third, the design of a universal XML data encryption program, using the program can be virtually any form of data into a database, and then converted into XML database, data output to achieve the security of XML data transfer, focusing on XML is given in detail data security transfer Java program code.Finally, the main innovation in point: Through data exchange program, we can see that in the receiver to determine the first digital signature is valid, if valid then the decrypted data; if an invalid will not have to decrypt, but will receive a data discarded, and then request data sender to resend the data, so that efficiency gains, the other aspect is the way some other forms of data through a database to establish a common standard for the use of the database conversion, expanding the scope of data encryption.
Keywords/Search Tags:XML data security exchange, XML encryption, XML signature, XML key management
PDF Full Text Request
Related items