电子文档交易市场
安卓APP | ios版本
电子文档交易市场
安卓APP | ios版本
换一换
首页 金锄头文库 > 资源分类 > PPT文档下载
分享到微信 分享到微博 分享到QQ空间

securedatatransmission-southerncaliforniae-business数据传输-南加利福尼亚电子商务安全

  • 资源ID:81768867       资源大小:624.50KB        全文页数:28页
  • 资源格式: PPT        下载积分:15金贝
快捷下载 游客一键下载
账号登录下载
微信登录下载
三方登录下载: 微信开放平台登录   支付宝登录   QQ登录  
二维码
微信扫一扫登录
下载资源需要15金贝
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
支付方式: 支付宝    微信支付   
验证码:   换一换

 
账号:
密码:
验证码:   换一换
  忘记密码?
    
1、金锄头文库是“C2C”交易模式,即卖家上传的文档直接由买家下载,本站只是中间服务平台,本站所有文档下载所得的收益全部归上传人(卖家)所有,作为网络服务商,若您的权利被侵害请及时联系右侧客服;
2、如你看到网页展示的文档有jinchutou.com水印,是因预览和防盗链等技术需要对部份页面进行转换压缩成图而已,我们并不对上传的文档进行任何编辑或修改,文档下载后都不会有jinchutou.com水印标识,下载后原文更清晰;
3、所有的PPT和DOC文档都被视为“模板”,允许上传人保留章节、目录结构的情况下删减部份的内容;下载前须认真查看,确认无误后再购买;
4、文档大部份都是可以预览的,金锄头文库作为内容存储提供商,无法对各卖家所售文档的真实性、完整性、准确性以及专业性等问题提供审核和保证,请慎重购买;
5、文档的总页数、文档格式和文档大小以系统显示为准(内容中显示的页数不一定正确),网站客服只以系统显示的页数、文件格式、文档大小作为仲裁依据;
6、如果您还有什么不清楚的或需要我们协助,可以点击右侧栏的客服。
下载须知 | 常见问题汇总

securedatatransmission-southerncaliforniae-business数据传输-南加利福尼亚电子商务安全

Secure Data Transmission,EDI-INT AS1, AS2, AS3 Kevin Grant,Goals of this Presentation,Understanding Security Mechanisms Understanding Applicability Statements MDNs Secure Transmission Loop AS1, AS2, AS3 Product Certification,AS1/AS2/AS3 Standards,Applicability Statements 1 (AS1), 2 (AS2), & 3 (AS3) are the current specifications developed by EDI-INT for transporting data via the Internet. AS Standards specify how to exchange data, not how to process data. AS1 defines how to perform secure file transfers via SMTP AS2 defines how to perform secure file transfers via HTTP AS3 defines how to perform secure file transfers via FTP Specify Security Services over a Specific Communication protocol with the introduction of Message Disposition Notifications (MDNs) to complete the Secure Transmission Loop,AS1/AS2/AS3 Options,Encrypted or not encrypted Signed or unsigned Receipt or no receipt Receipt signed, or not signed,AS1/AS2/AS3 Message Flow,Outgoing Message,Document hash is computed,Computed hash compared with transmitted hash,Incoming Message Validated,Security Mechanisms,Three basic building blocks are used: Encryption is used to provide confidentiality, can provide authentication and integrity protection Hash algorithms are used to provide integrity protection, can provide authentication Digital signatures are used to provide authentication, integrity protection, and non-repudiation One or more security mechanisms are combined to provide a security service,Security Protocol,A typical security protocol provides one or more services Services are built from mechanisms Mechanisms are implemented using algorithms,Hash Functions,Hashing is the transformation of a string of characters into a shorter fixed-length value or key that represents the original string. It is used to index and retrieve items in a database because it is faster to find the item using the shorter hashed key than to find it using the original value.,Hash Functions,It is also used in many encryption algorithms. Creates a unique “fingerprint” or message digest. Anyone can alter the data and calculate a new hash value Message digest has to be protected in some way,Public-key Encryption,Uses matched public/private key pairs (Asymmetric) Anyone can encrypt with the public key, only one person can decrypt with the private key,Cryptography Digital Signatures,Heres where the public-key algorithm and the hashing algorithm work together:,Certificates,A certificate is a public key that has been digitally signed by a trusted third party Certificate Authority (CA). A Certification Authority (CA) guarantees a public keys authenticity,MDNs (Message Disposition Notifications),Document acknowledgment Non-repudiation of delivery (confirms the document WAS received and by whom) Confirms that the recipient was able to decrypt Gives a status message, as appropriate Contains the receivers computed hash for comparison against the one originally sent with the message MDN may be signed by the recipient of the original message Defined by your trading partner (optional),MDN Request Headers,The MDN is requested by the “Disposition-Notification-To” field found in the message header: From: mrAS2as2.com AS2-Version: 1.1 AS2-From: AS2SENDER AS2-To: AS2RECEIVER Subject: G1 Test Case Message-Id: Disposition-Notification-To: mrAS2as2.com Receipt-Delivery-Option: mailto:AS2as2.com Disposition-Notification-Options: signed-receipt- protocol=optional,pkcs7-signature; signed-receipt-micalg=optional,sha1 Content-Type: multipart/signed; boundary=“as2BouNdary1as2“; protocol=“application/pkcs7-signature“; micalg=sha1,MDN Request Headers,The “Receipt-Delivery-Option” field is used to request MDNs in an asynchronous manner. If this field is not present, the MDN is returning via the active HTTP session (AS2): From: mrAS2as2.com AS2-Version: 1.1 AS2-From: AS2SENDER AS2-To: AS2RECEIVER Subject: G1 Test Case Message-Id: Disposition-Notification-To: mrAS2as2.com Receipt-Delivery-Option: mailto:AS2as2.com Disposition-Notification-Options: signed-receipt- protocol=optional,pkcs7-signature; signed-receipt-micalg=optional,sha1 Content-Type: multipart/signed; boundary=“as2BouNdary1as2“; protocol=“application/pkcs7-signature“; micalg=sha1,MDN Request Headers,The “Disposition-Notification-Options” field determines whether the MDN is to be signed and identifies the preferred hash algorithm (SHA-1 or MD5): From: mrAS2as2.com AS2-Version: 1.1 AS2-From: AS2SENDER AS2-To: AS2RECEIVER Subject: G1 Test Case Message-Id: Disposition-Notification-To: mrAS2as2.com Receipt-Delivery-Option: mailto:AS2as2.com Disposition-Notification-Options: signed-receipt- protocol=optional,pkcs7-signature; signed-receipt-micalg=optional,sha1 Content-Type: multipart/signed; boundary=“as2BouNdary1as2“; protocol=“application/pkcs7-signature“; micalg=sha1,The “Secure Transmission Loop” (STL),The originator sends a signed and encrypted document with a request for a signed receipt. The recipient decrypts the docum

注意事项

本文(securedatatransmission-southerncaliforniae-business数据传输-南加利福尼亚电子商务安全)为本站会员(tian****1990)主动上传,金锄头文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即阅读金锄头文库的“版权提示”【网址:https://www.jinchutou.com/h-59.html】,按提示上传提交保证函及证明材料,经审查核实后我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




关于金锄头网 - 版权申诉 - 免责声明 - 诚邀英才 - 联系我们
手机版 | 川公网安备 51140202000112号 | 经营许可证(蜀ICP备13022795号)
©2008-2016 by Sichuan Goldhoe Inc. All Rights Reserved.