Dissertation > Excellent graduate degree dissertation topics show

Research on Security of E-Commerce Based on SOAP

Author: LiuChao
Tutor: FuXiaoQing
School: Huazhong University of Science and Technology
Course: Information Security
Keywords: SOAP security E-commerce
CLC: TP393.08
Type: Master's thesis
Year: 2011
Downloads: 3
Quote: 0
Read: Download Dissertation

Abstract


Along with the development of the network, people are more and more preferring online shopping. Low cost, all varieties, and can be very convenient in different manufacturer comparisons, thus can buy the best of things.However, E-commerce, both parties may face the problem of cross-enterprise, cross-platform, cross-system and other issues, and SOAP agreement just can solve this problem, but applying the SOAP agreement on the E-commerce applications will bring new problems - safety problems.Safety is the lifeline of e-commerce, SOAP agreement will not be able to be applied to e-commerce field until its security problems have been solved.Through the research of traditional information security foundation, Web Service safety norms, e-commerce for safety, to meet the special requirements of SOAP agreement, as well as with SOAP agreement relevant specification and agreement, puts forward a complete security solutions, and designs a e-commerce security applications model。Due to a SOAP message itself is an XML document, thereby guaranteeing a SOAP message end-to-end security is based on XML document control to realize, through reference to traditional classical security theory foundation, to encrypt a SOAP message, signature, etc various processing, solved e-commerce security requirements of confidentiality, integrity, identity authentication and so on request.According to the design of e-commerce security applications model, in the last chapter through.net + WSE 3.0 platform, e-commerce security applications of designing and realizing the system. And through the tracking messages, proof program run completely match our expectations.

Related Dissertations

  1. Design and Implementation of Windows Kernel-mode Cryptographic Service Interface,TP309.7
  2. The Design and Implementation of Security Mechanism of Embedded Dependable Computer,TP309
  3. The Research of Vector CAD Electronic Drawing Protection System,TP391.72
  4. The Research of Malware Detection Technology Based on Active Mode,TP393.08
  5. Topology Measurement and Security Analysis on Gnutella and eMule Network,TP393.08
  6. Multiple Pairwise Keys Management Protocol of Function Node-Based for Wireless Sensor Networks,TP212.9
  7. Military exercises in the Corps of Engineers engineering equipment maintenance to protect the allocation of resources,E251.2
  8. Implementation and Research of Illegal Websites Detection System Based on Comparison Methods,TP393.08
  9. Study on US Veterans’ Social Security System and Its Enlightenment to China,E712
  10. Yellow phosphorus storage tank area of Safety Evaluation,TQ126.317
  11. The Study of Social Security System of the Fishermen of Guangdong after the Beibu Gulf Demarcation,F323.89
  12. Health protection of migrant workers,D412.6
  13. Research on Selection and Construction of the China’s Social Security Budget Pattern,D632.1
  14. Comprehensive Evaluation of Ecological Security of Land Application,X826
  15. Study on Evaluation Index System for Land Ecological Security,X826
  16. Urban Community Security Service Research in Terms of New Public Service Theory,D631.4
  17. Research on the Social Security of Fishermen under the Harmonious Society,D632.1
  18. Genetically Modified Food Ethics,B82-05
  19. On the systematic construction of the Chinese Communist Party democracy,D262.11
  20. The Analysis about Modes of Exchanging Land Contracted Management Right for Urban Social Security,D632.1
  21. Preparation and Characteration of Composite Microspheres with Dual-, Triple- Responsive Properties,O631.3

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile