Font Size: a A A

Xml Key Management System And Design

Posted on:2007-12-13Degree:MasterType:Thesis
Country:ChinaCandidate:H YinFull Text:PDF
GTID:2208360215477774Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of network commerce and network computation technology, especially e-commerce standard XML gradually developed for the isomerism platform in general construction in recent years, traditional network safe solutionā€”PKI could not satisfy the new safety requirement. Traditional PKI has only provided a frame, the concrete reality must rely on the software provider, this caused the PKI client software low interoperability which the different software provider provides and the customer needs to download the tedious PKI tool collection, it's not good for the deployment and popularization of PKI.Therefore, we need one kind of new technology, which may not only bring the convenience to the client, but also satisfy the security requirements in the new environment. In order to resolve the above problems, W3C publishes XML Key Management Specification (XKMS) in 2001. XKMS reduces the complexity of deploying PKI in client, and provides an interoperable security infrastructure for the network applications.The paper analyses the problems of CPKI system, expounds the idea, ingredients and founctions of XKMS in details. In this paper, the frame of the key and certificate management system based on XKMS is designed, the system model programming is given, and the main founction modules are encoded and realized. Through testing in the experiment environment, it is proved that the system accords with standard definition and runs stably, and the desired object is achieved. The optimizing scheme in the paper is put forward based on analysis of the system security. The system has so many advantages as cross-platform, portability, extending and security, which can be used as the third party providing the trust services for XML-based application systems in the fields of E-commerce and E-government. The project has a great and wide application prospect.At last, the paper discusses the XKMS application models which with the background of the process of customer purchase orders in E-commerce, puts forward seveal PKI application mechanisms upon different trusted domain modals. The concrete procedure of implementing security business by XML signature and XKMS service are given. The paper provides realistic reference for PKI application programming based on XKMS.
Keywords/Search Tags:PKI, XKMS, XML Encryption, XML Signature, Trust Domain
PDF Full Text Request
Related items