Googlelovqj
Forum Master
Joined: 21 Feb 2011
Posts: 403
Read: 0 topics
Location: England
|
|
christian louboutin sko XML Web Service in the sec |
|
XML Web Service in the security mechanism for data exchange method
The TripleDES block cipher algorithm. Encryption method is the block size is 8 bytes CBC (Ci-pherBlockChaining,[link widoczny dla zalogowanych], cipher block chaining). 2.5.2 XMI to decrypt encrypted data for all three described above encryption and decryption methods are get-DecryptedData. Encryption method simulateXml inside the class will be serialized to XML files encrypted text string, and pass it to getDecryptedData method of decryption. get-DecryptedData method identifies the EncryptedData tag and took out the password with the Base64 encoded value. There XMI decrypt encrypted tag all the information needed: name of encryption algorithm, encryption, encryption key data type and name. getDe-cryptedData method now generated under the name of the key and algorithm decryption key. Then it will extract the password with the Base64 encoded values, the decryption key and algorithm name passed to the internal method called Decrypt. Decrypt internal methods will have been decoded and decrypted data as a text string. The type of property in accordance with EncryptionData element of the text string operation,[link widoczny dla zalogowanych], the type attribute may be any of the following attributes: (1) the XMI file,[link widoczny dla zalogowanych], as a new XMI file to disk; (2) elements, replace the EncryptedData tag produce the original XMI file; (3) the element content, instead EncryptedData XML tags to produce the original document. 3 Conclusion In this paper, data security webService the XMI exchange issues and the appropriate application design, a XMI data protection methods,[link widoczny dla zalogowanych], proven (this method has been used in the import, export, encrypt confidential files, and achieved good results.), the use of XML Encryption with the simplicity, openness, flexibility,[link widoczny dla zalogowanych], scalability and so on. In addition to the encryption method, the reasonable choice of some other auxiliary security policy is also very important, such as the process access token, XMI data validity, data exchange point tracking, proper use of firewalls. webSer-vice in the XMI data security is still the essence of computer data security, because the data using the XMI format, so we can combine the characteristics derived from the actual needs of a variety of compliance applications secure encryption technology. XMI data security is not just a technical problem, and it is the entire enterprise system, an important component of security. In general, flexibility in the use of encryption methods and add the above strategy can solve the most common security vulnerabilities. 【References [1] Li Lihong. Several XMI document information analysis and application conversion method [J]. Computer Science, 2003,30 (1) :40-44. [2] Bo Chen, Xu full force. Web-based computing model WebServiceEJ]. Computer Applications. 2003 (1) :41-42. [3] Wu Chen. Wang Zhongmin. WebService Authentication System in} j application [J]. Application Research of Computers, 2003 (7) :80 - 82. E4] MARKBARTEI. XMISignatureSyntaxandProcessingEEB / () I]. [link widoczny dla zalogowanych] w3.0rg/TR/xm1ds1gcore /. 200308-15. [5] JOSEPHREAGIE. XMIEncryptionRequirements [EB / () I]. [link widoczny dla zalogowanych] w3. org / TR / xmlencryptionreq. 20020503. [6] MERIINHUGHES. DecryptionTransformforXMISignature [EB / OI]. [link widoczny dla zalogowanych] w3.0rg/TR/xm1cnc ~ dcrypt. 2003-1207. [7] BIIAISODIUM. ExploringXMIEncryption [EB / OI]. A 106 [link widoczny dla zalogowanych] ibm. c0m/deve10perw0rks/xm1 / ,200304-04.
相关的主题文章:
[link widoczny dla zalogowanych]
[link widoczny dla zalogowanych]
[link widoczny dla zalogowanych]
The post has been approved 0 times
|
|