Font Size: a A A

Study And Implementation On Security Scheme Of BTOC

Posted on:2009-03-26Degree:MasterType:Thesis
Country:ChinaCandidate:Z J ChengFull Text:PDF
GTID:2178360242490813Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Electronic commerce is the brightest outlook economic form in network economy. More and more person pay attention to the electronic transaction's security.Whether or not the electronic trade popularize, Its first condition is that the round turns believed firmly that their personal material will be respected and obtains proper protection. The security threat that electronic commerce is facing mainly includes: Illegal visit,Illegal distortion,Counterfeit forge,Refuses to serve, the disavowal behavior etc. To avoid these situation ,We must build a security platform to control this behavior happening in electronic transaction.With the BTOC commerce website application widespread, the network safe is involved to the vital interest of each business and consumer. At present, Because the BTOC website is mostly based on .Net and XML technology development, Therefore,the paper firstly briefed the BTOC commerce website security policy in the present researching situation,the outline of BTOC commerce website,the ontline of XML technology and .net technology; Then proposed the BTOC commerce website safety work which Based on XML; Finally constructed the safety control strategy which based on XACML BTOC, and I carried on the security policy concrete application in the practice BTOC commerce website.This article has obtained the main achievements as follows:(1) Has Proposed BTOC commerce website safety work which based on the XML, Including specifically: XML–encryption,XML–signature,Digital signature about SOAP news. Based on XML,the author used the program to realize the encryption and decryption of XML ,used X.509 certificate as the Security Token to realize the Signature of SOAP information ,and also encrypted the SOAP information through Symmetric encryption algorithm"Trible DES".(2) Has Proposed a safety BTOC serves controlling scheme which based on XACML, Including specifically: XACML access control and the analysis of XACML visiting request.
Keywords/Search Tags:BTOC, XML, Encryption, Signature, XACML, Implementation
PDF Full Text Request
Related items