Open Access Open Access  Restricted Access Subscription or Fee Access

Multicast Verification based on XML Signature

R. Kiruthika


Multicast authentication based on xml signature described the present network of prime language XML in network applications introduce its own XML language features and development to demonstrate aspects of XML knowledge in the application of network security and significance. The network security is a systems engineering which is need to carefully consider the security needs of the system, and a variety of security technologies, such as passwords and technology combine to produce a highly efficient, universal, secure network systems. Secondly, this paper analysis of network security architecture and the current network security system for the protection of technical methods used: the network against viruses, configuration, firewall, intrusion detection systems used, Web, Email, BBS's safety monitoring system, vulnerability scanning systems, IP Theft solution, using network monitoring to maintain system security subnet. Finally, the XML technology for network security enabled areas of security, XML has become a field for the safety of a valuable mechanism for exchange of data, related development is related to XML encryption and XML signature.


Network Security, Expansion, System, Method, Enable.

Full Text:



Zhou jing.” the Exploration of Data Transfer Mode between ASP and ASP.NET Page”[J]. Microcomputer Information􃧘2006􃧘5-3 pp.􃧦 114-115.

Zhou jing􃧘 liu quanju. “The System Safety Research and Design based on .NET Framework”[J].Communication Technology.2008-5.

Wei-yuxin. Network Invasion Examination System Key Technologies Research [D]. Beijing University of Posts and Telecommunications doctorate paper.2008.

Jing, Zhou,Yuan, Fang.” The component code of each call analyze and compare based on .NET”. Proc. Int. Symp. Intelligent Inf. Technol. Appl., IITA2009, (EI 20101012756764), IEEE Computer Society press,10.1109/IITA.2009.60

WangWenLong. Techniques [M]. Beijing: people's press, 2005.

YangKunPeng, MengFanQi, WenCai Inflammation. + SQL SERVER Dynamic Web Development from the Foundation to Practice [M].beijing: Electronic Industry Press, 2005.

ChuYue, “ Application Security Flaws and Prevention Strategies” [J]. Journal of Anhui: Anhui. 2007.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.