Formal Construction of Secure Information Transmission in Office Automation System

This paper mainly studies formal construction of secure information transmission in Office Automation system. With a comprehensive analysis on security requirements in Office Automation system, the processes of information transmission can be divided into two types: user-to-server and user-to-user....

Full description

Saved in:
Bibliographic Details
Published inWeb Information Systems and Mining pp. 291 - 298
Main Authors Li, Xiaole, Nie, Lianggang, Yin, Jianrong, Lu, Yuanlu
Format Book Chapter
LanguageEnglish
Published Berlin, Heidelberg Springer Berlin Heidelberg
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text

Cover

Loading…
Abstract This paper mainly studies formal construction of secure information transmission in Office Automation system. With a comprehensive analysis on security requirements in Office Automation system, the processes of information transmission can be divided into two types: user-to-server and user-to-user. Based on this, the formal processes of secure information transmission are constructed with composition method in symmetric key cryptosystem. The formal analysis shows that secrecy, integrity, availability and identifiability of information during transmission could be insured by this construction, which could be used as a direction for development of other various application systems in digital campus, from the viewpoint of information security.
AbstractList This paper mainly studies formal construction of secure information transmission in Office Automation system. With a comprehensive analysis on security requirements in Office Automation system, the processes of information transmission can be divided into two types: user-to-server and user-to-user. Based on this, the formal processes of secure information transmission are constructed with composition method in symmetric key cryptosystem. The formal analysis shows that secrecy, integrity, availability and identifiability of information during transmission could be insured by this construction, which could be used as a direction for development of other various application systems in digital campus, from the viewpoint of information security.
Author Lu, Yuanlu
Li, Xiaole
Nie, Lianggang
Yin, Jianrong
Author_xml – sequence: 1
  givenname: Xiaole
  surname: Li
  fullname: Li, Xiaole
  email: 28224384@qq.com
  organization: Experimental teaching center, Guangxi University of Finance and Economics, Nanning, China
– sequence: 2
  givenname: Lianggang
  surname: Nie
  fullname: Nie, Lianggang
  organization: Experimental teaching center, Guangxi University of Finance and Economics, Nanning, China
– sequence: 3
  givenname: Jianrong
  surname: Yin
  fullname: Yin, Jianrong
  organization: Experimental teaching center, Guangxi University of Finance and Economics, Nanning, China
– sequence: 4
  givenname: Yuanlu
  surname: Lu
  fullname: Lu, Yuanlu
  organization: Guangxi Polytechnic College, Nanning, China
BookMark eNpVkEFOwzAQRQ0Uibb0BixyAYPtSWzPsqooVKpUiZa15SY2CrQ2ipMFtycJ3bAa_fe_ZvFmZBJicIQ8cPbIGVNPqDQFKnNBAXKJVBrAK7LoMfRwZPKaTLnkfFjgzb9O44RMGTBBUeVwR2YpfTLGhEIxJW_r2JztKVvFkNqmK9s6hiz6bO_KrnHZJvihH-mhsSGd65SGUIds531dumzZtfGy2P-k1p3vya23p-QWlzsn7-vnw-qVbncvm9VySxPngNQzqEqvj0rqgucWhbSyEFJW2nFR5LkvKmUdglcFauEBEGylkGEhNNeIMCfi72_6burw4RpzjPErGc7MYM30CgyYXoIZDZnBGvwCrAJcoQ
ContentType Book Chapter
Copyright Springer-Verlag Berlin Heidelberg 2012
Copyright_xml – notice: Springer-Verlag Berlin Heidelberg 2012
DOI 10.1007/978-3-642-33469-6_39
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9783642334696
3642334695
EISSN 1611-3349
Editor Lei, Jingsheng
Gong, Zhiguo
Luo, Xiangfeng
Wang, Fu Lee
Editor_xml – sequence: 1
  givenname: Fu Lee
  surname: Wang
  fullname: Wang, Fu Lee
  email: pwang@cihe.edu.hk
– sequence: 2
  givenname: Jingsheng
  surname: Lei
  fullname: Lei, Jingsheng
  email: jshlei@shiep.edu.cn
– sequence: 3
  givenname: Zhiguo
  surname: Gong
  fullname: Gong, Zhiguo
  email: fstzgg@umac.mo
– sequence: 4
  givenname: Xiangfeng
  surname: Luo
  fullname: Luo, Xiangfeng
  email: luoxf@shu.edu.cn
EndPage 298
GroupedDBID -DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ACGFS
ADCXD
AEFIE
ALMA_UNASSIGNED_HOLDINGS
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RIG
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-s1139-f03dcf8b768514a926a65266d8e12544f5d7ae93f75982f3393ad790952818993
ISBN 9783642334689
3642334687
ISSN 0302-9743
IngestDate Tue Oct 01 19:07:31 EDT 2024
IsPeerReviewed true
IsScholarly true
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-s1139-f03dcf8b768514a926a65266d8e12544f5d7ae93f75982f3393ad790952818993
PageCount 8
ParticipantIDs springer_books_10_1007_978_3_642_33469_6_39
PublicationPlace Berlin, Heidelberg
PublicationPlace_xml – name: Berlin, Heidelberg
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSubtitle International Conference, WISM 2012, Chengdu, China, October 26-28, 2012. Proceedings
PublicationTitle Web Information Systems and Mining
Publisher Springer Berlin Heidelberg
Publisher_xml – name: Springer Berlin Heidelberg
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Nierstrasz, Oscar
Steffen, Bernhard
Kittler, Josef
Vardi, Moshe Y.
Weikum, Gerhard
Sudan, Madhu
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Pandu Rangan, C.
Kanade, Takeo
Hutchison, David
Tygar, Doug
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
  organization: Lancaster University, Lancaster, UK
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
  organization: Carnegie Mellon University, Pittsburgh, USA
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
  organization: University of Surrey, Guildford, UK
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
  organization: Cornell University, Ithaca, USA
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
  organization: ETH Zurich, Zurich, Switzerland
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
  organization: Stanford University, Stanford, USA
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
  organization: Weizmann Institute of Science, Rehovot, Israel
– sequence: 8
  givenname: Oscar
  surname: Nierstrasz
  fullname: Nierstrasz, Oscar
  organization: University of Bern, Bern, Switzerland
– sequence: 9
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
  organization: Indian Institute of Technology, Madras, India
– sequence: 10
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
  organization: University of Dortmund, Dortmund, Germany
– sequence: 11
  givenname: Madhu
  surname: Sudan
  fullname: Sudan, Madhu
  organization: Massachusetts Institute of Technology, USA
– sequence: 12
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
  organization: University of California, Los Angeles, USA
– sequence: 13
  givenname: Doug
  surname: Tygar
  fullname: Tygar, Doug
  organization: University of California, Berkeley, USA
– sequence: 14
  givenname: Moshe Y.
  surname: Vardi
  fullname: Vardi, Moshe Y.
  organization: Rice University, Houston, USA
– sequence: 15
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
  organization: Max-Planck Institute of Computer Science, Saarbrücken, Germany
SSID ssj0002792
ssj0000788985
Score 1.6920459
Snippet This paper mainly studies formal construction of secure information transmission in Office Automation system. With a comprehensive analysis on security...
SourceID springer
SourceType Publisher
StartPage 291
SubjectTerms formal construction
information transmission
Office Automation
symmetric key cryptosystem
Title Formal Construction of Secure Information Transmission in Office Automation System
URI http://link.springer.com/10.1007/978-3-642-33469-6_39
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Na9wwEBWb9JZD23yQlrbo0JtxiS1bsg49hJIQQrqBkJTtyci2HAKLfdjdS-mP74xG2tV2QyG9GGOMJM-TR6OP94axz3kOc2NZZIBA0adF1napbkqVlo1oywYGtC5DcvL3qbx6KK5n5Wwy-R2zS5bNl_bXs7yS_0EVngGuyJJ9AbLrQuEB3AO-cAWE4fpX8Lu9zEqi27ZJPJmI_nrSHqeTEy7tw_qwjduxnz2Zcb6GceozLEPveHw0m3d_-uxcqAM0RkWsnK9emWG-invZJVY_d2k_gxCto8HgKr7dap4bFKFTLfzhylvUrrDJ-Wo5bn0AuTmUX158vfEbHNNx6c6NJSEHRXBJO-uTyT_kuxyVBOI6UUjKJxQYXeCtYb5DDtCSg5YouyhI5jQ4Xcr35cfvnLJa7wwN8WkQqAwLkTqVtdB7bE9p8Iivzi-ub36sV-ggeKp0NJlCqUXak6JWIVMotFqRltPmKyKW5nNV7uy7u3Dm_g07QIoLR-4JGPMtm9jhkL0OxuXeuEfsjuDlMbx87DnByyN4eQwvfxo4wcs38HKC95g9XF7cf7tKfRKOdJHB7CDtz0TX9lUD01KIrY3OpZElRHVdZTOUt-vLThmrRa9QCrIXQgvTKQ2RO-qMQfR7wvaHcbCnjJ81rZGVKapOQdzYisrmENyrVuS2tUKV71gSjFLjb7Wog6Y2mLAWNZiwdias0YTvX_T2B7YPdrIfIYJcNp881H8A_V1rfg
link.rule.ids 785,786,790,799,27956
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Web+Information+Systems+and+Mining&rft.au=Li%2C+Xiaole&rft.au=Nie%2C+Lianggang&rft.au=Yin%2C+Jianrong&rft.au=Lu%2C+Yuanlu&rft.atitle=Formal+Construction+of+Secure+Information+Transmission+in+Office+Automation+System&rft.series=Lecture+Notes+in+Computer+Science&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783642334689&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=291&rft.epage=298&rft_id=info:doi/10.1007%2F978-3-642-33469-6_39
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon