{"title":"在异构环境中引入安全的数据传输方案","authors":"Kun Liu, Kun Ma, A. Abraham","doi":"10.1109/WICT.2013.7113101","DOIUrl":null,"url":null,"abstract":"Various information systems in the heterogeneous environment have resulted in a lot of discrete business data, and this type of storing method decreased the sharing of the data. In this paper, we designed and implement a secure data transmission scheme in the context of High Education Examination Management Information System of Shandong Province (HEEMISSP), in which all kinds of factors in the heterogeneous environment is taken into consideration. We integrate the security certificate technology and the encryption method with the remote method invocation (RMI). Measured by the security, completeness and non-repudiation of data transmission, the design fully satisfied the efficiency of data transmission which is requested by customer.","PeriodicalId":235292,"journal":{"name":"2013 Third World Congress on Information and Communication Technologies (WICT 2013)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Introducing secure data transmission scheme in a heterogeneous environment\",\"authors\":\"Kun Liu, Kun Ma, A. Abraham\",\"doi\":\"10.1109/WICT.2013.7113101\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Various information systems in the heterogeneous environment have resulted in a lot of discrete business data, and this type of storing method decreased the sharing of the data. In this paper, we designed and implement a secure data transmission scheme in the context of High Education Examination Management Information System of Shandong Province (HEEMISSP), in which all kinds of factors in the heterogeneous environment is taken into consideration. We integrate the security certificate technology and the encryption method with the remote method invocation (RMI). Measured by the security, completeness and non-repudiation of data transmission, the design fully satisfied the efficiency of data transmission which is requested by customer.\",\"PeriodicalId\":235292,\"journal\":{\"name\":\"2013 Third World Congress on Information and Communication Technologies (WICT 2013)\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Third World Congress on Information and Communication Technologies (WICT 2013)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WICT.2013.7113101\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Third World Congress on Information and Communication Technologies (WICT 2013)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WICT.2013.7113101","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Introducing secure data transmission scheme in a heterogeneous environment
Various information systems in the heterogeneous environment have resulted in a lot of discrete business data, and this type of storing method decreased the sharing of the data. In this paper, we designed and implement a secure data transmission scheme in the context of High Education Examination Management Information System of Shandong Province (HEEMISSP), in which all kinds of factors in the heterogeneous environment is taken into consideration. We integrate the security certificate technology and the encryption method with the remote method invocation (RMI). Measured by the security, completeness and non-repudiation of data transmission, the design fully satisfied the efficiency of data transmission which is requested by customer.