Font Size: a A A

Research On Informationg Security Technology In Manufacturing Based On XML

Posted on:2007-04-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y B YaoFull Text:PDF
GTID:2178360182478925Subject:Aviation Aerospace Manufacturing Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of information and computer technology, network manufacturing has been accepted and used widely, information integration in manufacturing based on XML has become a tendency. Under this background, how to protect enterprise's information is a problem that should not be neglected. This thesis analyzed the characteristics of manufacturing's information, a scheme of protecting enterprise's infoumation with XML-Security technology was proposed.XML-security system was designed and implemented based on the analysis of XML, information security and XML-security technology. The main research contents and creative ideas of the thesis as follows:1. XML-security is a perfect combination of XML technology and information security technology. Firstly, information security technology was researched, including three kinds of cryptographic algorithms, PKI, digital certificate and .NET Framework cryptography. And the .NET Framework cryptography was extended by adding the elliptic curve public key cryptosystem. Secondly, XML technology was researched. XML documents transmission model using Schema validation method was established, which is intended to propose a resolution for the existing problems in information interaction of network-manufacturing platform.2. Based on the analysis of XML-Signature Syntax and XML Encryption Syntax, the ideas and principles of design were discussed. The system has excellences of layer-built, modularization and extensible. The implement process of the system was described in detail. Decryption Transform for XML Signature was implemented, which can ensure the integration of XML-Signature and XML Encryption. XKMS client is a module of the system, which can transmit key certification information between system and PKI.3. In order to reduce the system's complexitiy, a new method called Schema method was designed. XML-Signature and XML Encryption can be executed automatically with it when the object is XML document. The method has the advantages of high efficiency, agility, and it dose not demolish the structure of XML at all.4. With Computer Supported Collaborative Design as applying background, the system was validated.
Keywords/Search Tags:Information Security, XML, XML-Security, XML Schema
PDF Full Text Request
Related items