Á¤º¸°úÇÐȸ ³í¹®Áö D : µ¥ÀÌŸº£À̽º
Current Result Document : 1 / 8
´ÙÀ½°Ç
ÇѱÛÁ¦¸ñ(Korean Title) |
À¯È¿¼ºÀ» °í·ÁÇÑ XML µ¥ÀÌŸ ¾ÏÈ£È ½Ã½ºÅÛÀÇ ¼³°è ¹× ±¸Çö |
¿µ¹®Á¦¸ñ(English Title) |
Design and Implementation of on XML Data Encryption System considering Validation |
ÀúÀÚ(Author) |
³²±Ã¿µÈ¯
¹Ú´ëÇÏ
Çã½ÂÈ£
¹éµÎ±Ç
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 29 NO. 06 PP. 0417 ~ 0428 (2002. 12) |
Çѱ۳»¿ë (Korean Abstract) |
XMLÀº Á¤º¸°øÀ¯ ¹× °Ë»ö¿¡ ÀÖ¾î¼ ¸Å¿ì È¿°úÀûÀÎ ÀåÁ¡À» Áö´Ñ ¸¶Å©¾÷ ¾ð¾îÀÌÁö¸¸ º¸¾È¿¡ Ãë¾àÇÑ ´ÜÁ¡À» °¡Áö°í ÀÖ´Ù. ÇÑÆí, À̸¦ º¸¿ÏÇÏ´Â XML ÀüÀÚ ¼¸í, XML µ¥ÀÌŸ ¾ÏÈ£È, XML Á¢±Ù Á¦¾î µîÀÇ ¿¬±¸´Â XML ¹®¼ÀÇ À¯È¿¼ºÀ» ¹èÁ¦ÇÏ°í ÀÖ´Ù. ±×·¯³ª XML ±â¹Ý Á¤º¸ ±³È¯ ¹× °øÀ¯ ȯ°æ¿¡¼ XML ¹®¼ÀÇ À¯È¿¼ºÀº ÇʼöÀûÀ¸·Î ¿ä±¸µÈ´Ù. º» ³í¹®¿¡¼´Â XML ¹®¼ÀÇ º¸¾È¼º°ú À¯È¿¼ºÀ» µ¿½Ã¿¡ Áö¿øÇÏ´Â XML º¸¾È ½Ã½ºÅÛÀ» ¼³°èÇÏ°í ±¸ÇöÇÏ¿´´Ù. Á¦¾ÈµÈ ½Ã½ºÅÛÀº XML µ¥ÀÌŸÀÇ ¾ÏÈ£È °úÁ¤¿¡¼ À¯È¿¼º À¯Áö¸¦ À§ÇØ XML ½ºÅ°¸¶ Á¤º¸¸¦ °»½ÅÇÏ¿© ÀÌÀÇ ÂüÁ¶¸¦ ÅëÇØ XML ¹®¼ÀÇ À¯È¿¼º Áö¿øÇÑ´Ù. ¶ÇÇÑ XML ½ºÅ°¸¶ ÀüÀÚ ¼¸í°ú °°Àº XML ½ºÅ°¸¶ °ü·Ã º¸¾È ±â´ÉÀ» Áö¿øÇϸç ÀÌ °úÁ¤¿¡¼ ºü¸¥ Á¤±ÔÈ XML ½ºÅ°¸¶ Çؼ®À» À§ÇØ DOMHash ±â¹ýÀ» »ç¿ëÇÏ¿´´Ù. Á¦¾ÈµÈ ½Ã½ºÅÛÀ» ÅëÇØ À¯È¿¼ºÀ» À¯ÁöÇÏ´Â XML ¹®¼´Â À¯¿¬¼º ¹× È®À强°ú ½Å·Ú¼º¿¡ ÀÖ¾î ±âÁ¸ ½Ã½ºÅÛº¸´Ù ÁÁÀº ±â´ÉÀ» °®´Â´Ù. |
¿µ¹®³»¿ë (English Abstract) |
XML(eXtensible Markup Language) is effective to information retrieval and sharing but has defects related to the data security. And, as a solution of this problem, the current XML security researches such as XML digital signature, XML data encryption, and XML access control exclude the validation property of XML document. The validation of XML should be considered for the secure information sharing in the XML-based environment. In this paper, we design and implement the system to support both security and validation to XML document. Our system performs data encryption and maintenance of valid status of XML document by referencing new XML schema namespace. In addition, it also provides the XML schema security function through the XML schema digital signature. During generating XML schema digital signature, DOMHash method which has the advantage of the faster speed than canonical XML method is applied to XML schema. In conclusion, our system shows the improved functions in flexibility, scalability, and reliability compared with the existing XML security researches., |
Å°¿öµå(Keyword) |
¸ÞŸµ¥ÀÌŸ °ü¸®
XML
XML º¸¾È
XML À¯È¿¼º
XML ½ºÅ°¸¶
DOMHash
XML security
XML validation
XML Schema
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|