跳到主要內容

臺灣博碩士論文加值系統

(3.90.139.113) 您好!臺灣時間:2022/01/16 17:43
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:文忠民
研究生(外文):Chung-Min Wen
論文名稱:XML文件可撤回及不可否認性之研究
論文名稱(外文):A study on XML document’s revocation and non-repudiation
指導教授:楊武楊武引用關係
指導教授(外文):Wuu Yang
學位類別:碩士
校院名稱:國立交通大學
系所名稱:資訊科學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2002
畢業學年度:90
語文別:中文
論文頁數:52
中文關鍵詞:XML權限控制
外文關鍵詞:XMLAccess controlnon-repudiationrevocation
相關次數:
  • 被引用被引用:0
  • 點閱點閱:112
  • 評分評分:
  • 下載下載:15
  • 收藏至我的研究室書目清單書目收藏:0
近年來,XML的發展及應用相當的快速,XML因為它可自我描述及跨平臺等特性,使得文件的表示也有全面使用XML的趨勢,因此XML文件的安全性及權限管理成為相當重要的問題,然而XML到目前爲此卻沒有一套安全及權限管理上的標準,因此我們提出一套管理系統,希望能改善上述的情況,並使得文件的管理上更安全及更有效率。
在論文中,我們針對XML文件的權限管理提出一個分散式的系統,系統中使用加密文件部分元素的方式來確保文件的安全,而用戶端要存取加密的部分時需透過系統中的加密伺服器來存取,利用將解密動作由用戶端抽離,可達到可撤回的目的,利用記錄通訊金鑰的方式我們也可以達到不可否認性,最後我們為了簡化程式開發的難度,我們使用代理人程式來當成仲介程式,這樣不只使得程式容易開發,也使用系統很有彈性。

With the fast development and increasing popularity of the XML, there was more and more documents will be present by XML. Every XML document is insecure because there was no access control on this document. And there was no access control standard for XML document, so we propose a security architecture to improve the XML document access control and enhance it’s performance by cryptography method.
In this thesis, we design a distributed system to improve XML document access control. When we want to control some document’s elements, we encrypt them by cryptography method, and we can security those elements. If client or users want to access those encrypted elements, they should decrypt it through the server called decryption server. And we can authorize user by this way when they want to access the element. For simplify the client program, we propose a library named agent. This agent will implement all protocol we will use, and this agent will enhance the flexibility and extensibility of our system.

中文摘要 …………………………………………………………………i
英文摘要 …………………………………………………………………ii
誌謝 ………………………………………………………………………iii
目錄 ………………………………………………………………………iv
圖目錄 ……………………………………………………………………vi
表目錄 ……………………………………………………………………viii
第一章 緒論 ……………………………………………………………1
1.1研究動機 ……………………………………………………………1
1.2研究目標 ……………………………………………………………1
1.3論文架構 ……………………………………………………………2
第二章 相關研究…………………………………………………………3
2.1 Kerberos ……………………………………………………………3
2.2 KryptoKnight ………………………………………………………6
2.3 XML Encryption ……………………………………………………8
2.4 Author-X …………………………………………………………11
第三章 系統設計 ………………………………………………………14
3.1系統架構 ……………………………………………………………14
3.1.1可撤回性 ………………………………………………………14
3.1.2不可否認性 ………………………………………………………17
3.1.3代理人 ……………………………………………………………19
3.2系統架構 ……………………………………………………………20
3.2.1實作環境 …………………………………………………………20
3.2.2系統模型 …………………………………………………………20
3.3通訊協定 ……………………………………………………………23
3.3.1加密通訊協定 ……………………………………………………23
3.3.2解密通訊協定 ……………………………………………………24
3.4系統實作 ……………………………………………………………30
第四章 實作結果 ………………………………………………………38
4.1運作過程 ……………………………………………………………38
4.2實作結果 ……………………………………………………………48
第五章 結論 ……………………………………………………………49
5.1結論 …………………………………………………………………49
5.2未來發展方向 ………………………………………………………49
參考文獻 ………………………………………………………………51

[1] L. Bai, R. Achuthanandam, and M. Kam,” Access Revocation and Prevention of False Repudiation in Secure Email Exchanges”, in Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems, March 2001.
[2] L. Batista de Almeida, W. Godoy Jr., J.L. Kovaleski, “An authentication server in Java implementation of an encryption framework model and DES algorithm in Java”, in Telecommunications Symposium, 1998. ITS '98 Proceedings. SBT/IEEE International, Vol.12, pp.627-631, Aug 1998.
[3] E. Bertino, S. Castano, and E. Ferrari, “Securing XML Documents with Author-X”, IEEE Internet Computing, Vol.5, pp. 21—31, May/Jun 2001.
[4] R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, and M. Yung, “The KryptoKnight Family of Light-Weight Protocols for Authentication and Key Distribution”, IEEE/ACM Transactions on Networking, Vol. 3, No. 1, pp.31-41, February 1995.
[5] B. Clifford Neuman, and T. Ts’o, “Kerberos: An Authentication Service for Computer Networks”, IEEE Communications Magazine, Vol. 32, No. 9, pp.33-38, September 1994.
[6] E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, “Securing XML Documents”, in Proc. of the 2000 International Conference on Extending Database Technology (EDBT2000), Konstanz, Germany, March 27-31, 2000.
[7] L. Gong, “Using One-Way Functions for Authentication”, ACM Computer Communication Review, Vol.19, pp. 8-11, 1989.
[8] P. Janson, G. Tsudik, and M. Yung, “Scalability and Flexibility in Authentication Services: The KryptoKnight Approach”, in Proceedings of INFOCOM’97, pp.725-736, 1997.
[9] M. Kudo, S. Hada, “XML Document Security based on Provisional Authorization”, Proceedings of the 7th ACM conference on Computer and communications security, November 2000.
[10] Rolf Oppliger, Authentication Systems for Secure Networks, Artech House, 1996.
[11] “Extensible Markup Language (XML) 1.0”, World Wide Web Consortium (W3C), October 2000, http://www.w3.org/TR/REC-xml.
[12] “Java TM 2 Platform standard edition”, 2002, http://java.sun.com/j2se/.
[13] “Java TM Cryptography Extension”, 2002, http://java.sun.com/products/jce/.
[14] “Java TMAPI for XML Processing”, 2002, http://java.sun.com/xml/jaxp/.
[15] “Kerberos: The Network Authentication Protocol”, May 2002, http://web.mit.edu/kerberos/www/.
[16] “XML Encryption Syntax and Processing”, World Wide Web Consortium (W3C), March 2002, http://www.w3.org/TR/xmlenc-core/.
[17] “XML Path Language (XPath) Version 1.0”, World Wide Web Consortium (W3C), November 1999, http://www.w3.org/TR/xpath.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top