Font Size: a A A

Research On The Security Of Data Based On EMIF

Posted on:2007-01-28Degree:MasterType:Thesis
Country:ChinaCandidate:T ZhuFull Text:PDF
GTID:2178360182489361Subject:Education Technology
Abstract/Summary:PDF Full Text Request
Along with the accelerated process of information, more and more education managements used the computer and network to service their daily work. Because different departments have different levels of information technology, information requests and data sources, the entire school network realize management and data integration becomes very difficult. The proposing of specification for education management information system interoperability framework (EMIF) has laid the good foundation for exchanging information between all kinds of education management software and realizing system interoperability. Under the EMIF instruction, the education management information system uses XML as the data exchange technology, which is helpful for strengthening the cooperation between the different systems to enhance the efficiency of education information management.The data integration, sharing and safe transmission are all necessary for education management information system to operate well. As a kind of data exchange language widely used on the internet, XML brought the security problem. Now, how to realize the safe transmission of XML data in education management information system needs to be solved.The paper studied the data security schema of education management information system. Using the user authorization and the confirmation mechanism, this system limited user's visit jurisdiction. According to encryption and the digital signature, the XML data was protected. This paper is based on the EMIF specification.At first the paper introduced the knowledge of data security about education management information system. Then the concepts of data security and the security technology of XML data were described. Furthermore, the schema of data transmission security based on EMIF and the methods of XML encryption was analyzed.
Keywords/Search Tags:EMIF, XML, data security, encryption, signatures, key management
PDF Full Text Request
Related items