Font Size: a A A

Search And Application Of XML Encryption And XML Digital Signature

Posted on:2010-06-28Degree:MasterType:Thesis
Country:ChinaCandidate:F ZhangFull Text:PDF
GTID:2178330332988617Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Along with the rapid development of Internet and network applications, XML technology becomes popular on data storage and data exchange in a TCP/IP network. The security of XML data is being paid more attention. XML is the bases of Web Services and its security becomes much more important. However, the traditional security technology now is not satisfied.The XML security mainly concerns about the following knowledge:XML Encryption, XML Signature, XML Key Management Specification (short for XKMS), Security Assertion Markup Language (short for SAML) and etc. The paper pays more attention to the XML Encryption and XML Signature. XML Security technology can guarantee data of being transported integrated, confidential and nonrepudiation. It also can compensate the deficiency of traditional security technology and enhance the security of web resources. Furthermore, both the XML signature and XML Encryption are the bases of a series of Web Services specification. Therefore, XML security plays a very important role for the development of Web.This paper first introduces the XML and other relational technologies, and analyses the security of Web Services based on XML.Then, this paper analyses the XML data signature, XML Encryption and XKMS, and these prominent excellences compared to traditional security technologies. The effects of they playing in the XML transmission security, and their own applications are also presented. The agility of XML Encryption chosen in encrypted granularity is searched in particular. A XML undeniable signature method is given. The XKMS different application models in three conditions:in a same trust-field, between two different trust-fields, between XKMS service trust-field and PKI service trust-field are putted forward.Finally, based on these searches, a design of a bookstore in network is presented. In this case, accomplish the XML Encryption, XML Decryption, XML Signature and verification of XML Signature by combing. The mostly basic functions of this bookstore are implemented. And during the processes of basic functions, the work and applications of XML Encryption and Signature to suit for the data security is analyzed.
Keywords/Search Tags:Web Service Security, XML Digital Signature, XML Encryption, XKMS
PDF Full Text Request
Related items