Font Size: a A A

Study On And Application Of The XML Security Technology Based On Permutation Code Encryption Algorithm

Posted on:2008-01-09Degree:MasterType:Thesis
Country:ChinaCandidate:S Q ZhuFull Text:PDF
GTID:2178360245978592Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The paper mainly studies on available achievement in the field of xml security, also applies the permutation code encryption algorithm, which have got independent intellectual property right to this field at the same time. The article has detailed introduced the principle of permutation code encryption algorithm, and realizing permutation code encryption algorithm for 8-bit block with java.Now the study in the homeland limited in the stage of verification and realization for xml encryption. xml security detailed into practice in popular service oriented architecture is analyzed and studied in this article. The first step has summed up out one kind of comparatively nimble and ideal safe model, model adopt four layers of system frame MVCS, model M, view V, controller C, security S. Security is independent being considered as a layer, which help reduce systematic degree of coupling, cutting down upkeep cost. The model complies with W3C xml encrypts Standards, has characteristic in self at the same time, The encryption algorithm can be free to choose by user, the safe model is facilitating, reliable, solid and used universally, expect to drive the new development in the field of information security.
Keywords/Search Tags:permutation code, xml security, encryption, service oriented architecture
PDF Full Text Request
Related items