Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Multicast Verification Based on XML Signature


Affiliations
1 Department of Computer Science, Rathinam College of Arts and Science, Coimbatore, India
     

   Subscribe/Renew Journal


Multicast authentication based on xml signature described the present network of prime language XML in network applications introduce its own XML language features and development to demonstrate aspects of XML knowledge in the application of network security and significance. The network security is a systems engineering which is need to carefully consider the security needs of the system, and a variety of security technologies, such as passwords and technology combine to produce a highly efficient, universal, secure network systems. Secondly, this paper analysis of network security architecture and the current network security system for the protection of technical methods used: the network against viruses, configuration, firewall, intrusion detection systems used, Web, Email, BBS's safety monitoring system, vulnerability scanning systems, IP Theft solution, using network monitoring to maintain system security subnet. Finally, the XML technology for network security enabled areas of security, XML has become a field for the safety of a valuable mechanism for exchange of data, related development is related to XML encryption and XML signature.


Keywords

Network Security, Expansion, System, Method, Enable.
User
Subscription Login to verify subscription
Notifications
Font Size

  • Zhou jing.” the Exploration of Data Transfer Mode between ASP and ASP.NET Page”[J]. Microcomputer Information􃧘2006􃧘5-3 pp.􃧦 114-115.
  • Zhou jing􃧘 liu quanju. “The System Safety Research and Design based on .NET Framework”[J].Communication Technology.2008-5.
  • Wei-yuxin. Network Invasion Examination System Key Technologies Research [D]. Beijing University of Posts and Telecommunications doctorate paper.2008.
  • Jing, Zhou,Yuan, Fang.” The component code of each call analyze and compare based on .NET”. Proc. Int. Symp. Intelligent Inf. Technol. Appl., IITA2009, (EI 20101012756764), IEEE Computer Society press,10.1109/IITA.2009.60
  • WangWenLong. Asp.net Techniques [M]. Beijing: people's press, 2005.
  • YangKunPeng, MengFanQi, WenCai Inflammation. Asp.net + SQL SERVER Dynamic Web Development from the Foundation to Practice [M].beijing: Electronic Industry Press, 2005.
  • ChuYue, “Asp.net Application Security Flaws and Prevention Strategies” [J]. Journal of Anhui: Anhui. 2007.

Abstract Views: 213

PDF Views: 3




  • Multicast Verification Based on XML Signature

Abstract Views: 213  |  PDF Views: 3

Authors

R. Kiruthika
Department of Computer Science, Rathinam College of Arts and Science, Coimbatore, India

Abstract


Multicast authentication based on xml signature described the present network of prime language XML in network applications introduce its own XML language features and development to demonstrate aspects of XML knowledge in the application of network security and significance. The network security is a systems engineering which is need to carefully consider the security needs of the system, and a variety of security technologies, such as passwords and technology combine to produce a highly efficient, universal, secure network systems. Secondly, this paper analysis of network security architecture and the current network security system for the protection of technical methods used: the network against viruses, configuration, firewall, intrusion detection systems used, Web, Email, BBS's safety monitoring system, vulnerability scanning systems, IP Theft solution, using network monitoring to maintain system security subnet. Finally, the XML technology for network security enabled areas of security, XML has become a field for the safety of a valuable mechanism for exchange of data, related development is related to XML encryption and XML signature.


Keywords


Network Security, Expansion, System, Method, Enable.

References