Font Size: a A A

Xml-based Information Security Technology Research And Applications

Posted on:2007-12-12Degree:MasterType:Thesis
Country:ChinaCandidate:X LiuFull Text:PDF
GTID:2208360185983021Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of network commercial affair and network computing technology, the research of security problem is deepened more and more , especially Web services based on XML technology gradually ripe and deploy application in recent years, the traditional security solution (such as PKI technology ) hasn' t met new security needs , the security problem has already become one of the main obstacles that prevent web services from using on a large scale.The other , when the developers use the electronic key and electronic signature in the pc computer and embedded program of E-commerce, They have to use every develop businessmen' s tools. So functions of the PKI is not common. But xml is a marked language used by many people, It has good extentions and feasible than html. XKMS is a convenient mechanism of integration and access the pki, it makes the Electronic authentication function embedded in servers, makes the information authority on xml pattern possible.This article main content as follows: (1)Introduce the basical knowledge.This introduce the knowledge about PKI: PKI is the Public Key Infrastrucure, It has used the widespreadly. PKI included the Encryption .Digital Signature, Data integrity, Digital Digital envelope, Dual digital signature, Digital Certificate and so on. Through the many kinds of technical union, provide the safe service the foundation frame. (2) Introduce the security technology of XML.This part mainly introduced the XML several kind of securities technology, included XML Encryption, XML Signature, XML Key Management. XML Encryption can encrypt the content by different granularity, for example: encrypt the whole XML document;encrypt a element of the XML document. XML Signature provides to any data service and so on type integrity, news authentication, authentication. Regardless of is in includes this signature the XML interior in else where. The main goal of XML signature is guaranteeing the XML document content not to tamper with. XKMS provides the convient methods of using PKI.
Keywords/Search Tags:PKI, XML-Encryption, XML-Signature, XML Key Management
PDF Full Text Request
Related items