Font Size: a A A

Research Of Geospatial Data Security Technology Under The Internet Environment

Posted on:2008-10-11Degree:MasterType:Thesis
Country:ChinaCandidate:L K QinFull Text:PDF
GTID:2120360278455914Subject:Cartography and Geographic Information Engineering
Abstract/Summary:PDF Full Text Request
Along with the development of network geographical information system and the people' demand for the geographical information system (GIS), through the Internet issuing and publicing geospatial data, provided for the user browsing, inquires and gains and even carries on the more complex GIS application already become inevitable trend of the GIS development. However, only using the small scale, brief spatial data on the Internet because of the limit of government'series stipulation for the geospatial data security request on the present stage can't enable the magnanimous geospatial data to obtain the full use, and also caused GIS's application to be limited. In order to use richly, large or medium scale detailed geospatial data, based on analyzing each laws and regulations related with the geospatial data security in this paper, the basic geospatial data security technology was research from following several aspect.According to the related security laws and regulations about the geospatial data, geospatial data security was analysised from three aspects that were mathematics foundation, the position precision and the geographic features content.In view of 1: 250,000 DLG data, security plan and basic technical route about the position precision of geographic features were proposed; The security technology flow was Summarized; And fast processing batch geospatial data was able to be realized. Then through analysising its result, the conclusion that above processing method suits geospatial data's position precision of geographic features was drawn.Meanwhile, other geographic features content of 1: 250,000 DLG data has been researched in this paper.Not only the processing method about the single geographic feature was proposed, but also the security of combined geographic features was experimented.
Keywords/Search Tags:GIS, Security, Geospatial data, Coordinate transformation, Affine transformation, Geographic features
PDF Full Text Request
Related items