Study of Security of Virtual Host Based on XML

Article Preview

Abstract:

When some companies or individuals rent the virtual host as their own servers, there is a problem: how to ensure the security of their networked database This paper discusses security of exchanging information between virtual host and clients using XML(Extensible Markup Language). This paper also provides a safe way based on RSA algorithm and XML security suite applied in estate company

You might also be interested in these eBooks

Info:

Periodical:

Pages:

367-374

Citation:

Online since:

September 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] M. Lenzerini, Data integration: A theoretical perspective, In Proc. of ACM PODS, (2002).

Google Scholar

[2] M. Benedikt, C. Chan, W. Fan, J. Freire, and R. Rastogi, Capturing both Types and Constraints in Data Integration, In Proc. of ACM SIGMOD, (2003).

DOI: 10.1145/872757.872792

Google Scholar

[3] M. Arenas and L. Libkin, Xml data exchange: Consistency and query answering, In Proc. of ACM PODS, (2005).

DOI: 10.1145/1065167.1065171

Google Scholar

[4] S. Abiteboul, L. Segoufin, and V. Vianu, Representing and querying xml with incomplete information, In Proc. of ACM PODS, (2001).

DOI: 10.1145/375551.375571

Google Scholar

[5] Didier Martin, et al., Professional XML, Wrox Press, (2000).

Google Scholar

[6] Ding Yao Chao and Zhang Tao, MySQL Handbook. Published by Pei Jing Education, Inc., (2005).

Google Scholar

[7] Charles F. Goldfarb and Paul Prescod, XML Handbook, Fourth Edition. Published by Pearson Education, Inc., (2002).

Google Scholar

[8] P. Boncz, A. Wilschut, and M. Kersten, Flattening an object algebra to provide performance. In Proc. Of ICDE, Orlando, FL, (1998).

Google Scholar

[9] J. Shanmugasundaram et al., Relational databases for querying XML documents: Limitations and opportu-nities. In Proc. of VLDB, Edinburgh, Scotland, (1999).

Google Scholar

[10] M. Beckerle and M. Westhead, GGF DFDL Primer. Technical report, Global Grid Forum, (2004).

Google Scholar

[11] Blake Dournaee, XML Securityr. Published by McGraw-Hill, (2010).

Google Scholar