Formal Construction of Secure Information Transmission in Office Automation System
This paper mainly studies formal construction of secure information transmission in Office Automation system. With a comprehensive analysis on security requirements in Office Automation system, the processes of information transmission can be divided into two types: user-to-server and user-to-user....
Saved in:
Published in | Web Information Systems and Mining pp. 291 - 298 |
---|---|
Main Authors | , , , |
Format | Book Chapter |
Language | English |
Published |
Berlin, Heidelberg
Springer Berlin Heidelberg
|
Series | Lecture Notes in Computer Science |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This paper mainly studies formal construction of secure information transmission in Office Automation system. With a comprehensive analysis on security requirements in Office Automation system, the processes of information transmission can be divided into two types: user-to-server and user-to-user. Based on this, the formal processes of secure information transmission are constructed with composition method in symmetric key cryptosystem. The formal analysis shows that secrecy, integrity, availability and identifiability of information during transmission could be insured by this construction, which could be used as a direction for development of other various application systems in digital campus, from the viewpoint of information security. |
---|---|
AbstractList | This paper mainly studies formal construction of secure information transmission in Office Automation system. With a comprehensive analysis on security requirements in Office Automation system, the processes of information transmission can be divided into two types: user-to-server and user-to-user. Based on this, the formal processes of secure information transmission are constructed with composition method in symmetric key cryptosystem. The formal analysis shows that secrecy, integrity, availability and identifiability of information during transmission could be insured by this construction, which could be used as a direction for development of other various application systems in digital campus, from the viewpoint of information security. |
Author | Lu, Yuanlu Li, Xiaole Nie, Lianggang Yin, Jianrong |
Author_xml | – sequence: 1 givenname: Xiaole surname: Li fullname: Li, Xiaole email: 28224384@qq.com organization: Experimental teaching center, Guangxi University of Finance and Economics, Nanning, China – sequence: 2 givenname: Lianggang surname: Nie fullname: Nie, Lianggang organization: Experimental teaching center, Guangxi University of Finance and Economics, Nanning, China – sequence: 3 givenname: Jianrong surname: Yin fullname: Yin, Jianrong organization: Experimental teaching center, Guangxi University of Finance and Economics, Nanning, China – sequence: 4 givenname: Yuanlu surname: Lu fullname: Lu, Yuanlu organization: Guangxi Polytechnic College, Nanning, China |
BookMark | eNpVkEFOwzAQRQ0Uibb0BixyAYPtSWzPsqooVKpUiZa15SY2CrQ2ipMFtycJ3bAa_fe_ZvFmZBJicIQ8cPbIGVNPqDQFKnNBAXKJVBrAK7LoMfRwZPKaTLnkfFjgzb9O44RMGTBBUeVwR2YpfTLGhEIxJW_r2JztKVvFkNqmK9s6hiz6bO_KrnHZJvihH-mhsSGd65SGUIds531dumzZtfGy2P-k1p3vya23p-QWlzsn7-vnw-qVbncvm9VySxPngNQzqEqvj0rqgucWhbSyEFJW2nFR5LkvKmUdglcFauEBEGylkGEhNNeIMCfi72_6burw4RpzjPErGc7MYM30CgyYXoIZDZnBGvwCrAJcoQ |
ContentType | Book Chapter |
Copyright | Springer-Verlag Berlin Heidelberg 2012 |
Copyright_xml | – notice: Springer-Verlag Berlin Heidelberg 2012 |
DOI | 10.1007/978-3-642-33469-6_39 |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 9783642334696 3642334695 |
EISSN | 1611-3349 |
Editor | Lei, Jingsheng Gong, Zhiguo Luo, Xiangfeng Wang, Fu Lee |
Editor_xml | – sequence: 1 givenname: Fu Lee surname: Wang fullname: Wang, Fu Lee email: pwang@cihe.edu.hk – sequence: 2 givenname: Jingsheng surname: Lei fullname: Lei, Jingsheng email: jshlei@shiep.edu.cn – sequence: 3 givenname: Zhiguo surname: Gong fullname: Gong, Zhiguo email: fstzgg@umac.mo – sequence: 4 givenname: Xiangfeng surname: Luo fullname: Luo, Xiangfeng email: luoxf@shu.edu.cn |
EndPage | 298 |
GroupedDBID | -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ABMNI ACGFS ADCXD AEFIE ALMA_UNASSIGNED_HOLDINGS EJD F5P FEDTE HVGLF LAS LDH P2P RIG RNI RSU SVGTG VI1 ~02 |
ID | FETCH-LOGICAL-s1139-f03dcf8b768514a926a65266d8e12544f5d7ae93f75982f3393ad790952818993 |
ISBN | 9783642334689 3642334687 |
ISSN | 0302-9743 |
IngestDate | Tue Oct 01 19:07:31 EDT 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-s1139-f03dcf8b768514a926a65266d8e12544f5d7ae93f75982f3393ad790952818993 |
PageCount | 8 |
ParticipantIDs | springer_books_10_1007_978_3_642_33469_6_39 |
PublicationPlace | Berlin, Heidelberg |
PublicationPlace_xml | – name: Berlin, Heidelberg |
PublicationSeriesTitle | Lecture Notes in Computer Science |
PublicationSubtitle | International Conference, WISM 2012, Chengdu, China, October 26-28, 2012. Proceedings |
PublicationTitle | Web Information Systems and Mining |
Publisher | Springer Berlin Heidelberg |
Publisher_xml | – name: Springer Berlin Heidelberg |
RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Nierstrasz, Oscar Steffen, Bernhard Kittler, Josef Vardi, Moshe Y. Weikum, Gerhard Sudan, Madhu Naor, Moni Mitchell, John C. Terzopoulos, Demetri Pandu Rangan, C. Kanade, Takeo Hutchison, David Tygar, Doug |
RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David organization: Lancaster University, Lancaster, UK – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo organization: Carnegie Mellon University, Pittsburgh, USA – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef organization: University of Surrey, Guildford, UK – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. organization: Cornell University, Ithaca, USA – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann organization: ETH Zurich, Zurich, Switzerland – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. organization: Stanford University, Stanford, USA – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni organization: Weizmann Institute of Science, Rehovot, Israel – sequence: 8 givenname: Oscar surname: Nierstrasz fullname: Nierstrasz, Oscar organization: University of Bern, Bern, Switzerland – sequence: 9 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. organization: Indian Institute of Technology, Madras, India – sequence: 10 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard organization: University of Dortmund, Dortmund, Germany – sequence: 11 givenname: Madhu surname: Sudan fullname: Sudan, Madhu organization: Massachusetts Institute of Technology, USA – sequence: 12 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri organization: University of California, Los Angeles, USA – sequence: 13 givenname: Doug surname: Tygar fullname: Tygar, Doug organization: University of California, Berkeley, USA – sequence: 14 givenname: Moshe Y. surname: Vardi fullname: Vardi, Moshe Y. organization: Rice University, Houston, USA – sequence: 15 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard organization: Max-Planck Institute of Computer Science, Saarbrücken, Germany |
SSID | ssj0002792 ssj0000788985 |
Score | 1.6920459 |
Snippet | This paper mainly studies formal construction of secure information transmission in Office Automation system. With a comprehensive analysis on security... |
SourceID | springer |
SourceType | Publisher |
StartPage | 291 |
SubjectTerms | formal construction information transmission Office Automation symmetric key cryptosystem |
Title | Formal Construction of Secure Information Transmission in Office Automation System |
URI | http://link.springer.com/10.1007/978-3-642-33469-6_39 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Na9wwEBWb9JZD23yQlrbo0JtxiS1bsg49hJIQQrqBkJTtyci2HAKLfdjdS-mP74xG2tV2QyG9GGOMJM-TR6OP94axz3kOc2NZZIBA0adF1napbkqVlo1oywYGtC5DcvL3qbx6KK5n5Wwy-R2zS5bNl_bXs7yS_0EVngGuyJJ9AbLrQuEB3AO-cAWE4fpX8Lu9zEqi27ZJPJmI_nrSHqeTEy7tw_qwjduxnz2Zcb6GceozLEPveHw0m3d_-uxcqAM0RkWsnK9emWG-invZJVY_d2k_gxCto8HgKr7dap4bFKFTLfzhylvUrrDJ-Wo5bn0AuTmUX158vfEbHNNx6c6NJSEHRXBJO-uTyT_kuxyVBOI6UUjKJxQYXeCtYb5DDtCSg5YouyhI5jQ4Xcr35cfvnLJa7wwN8WkQqAwLkTqVtdB7bE9p8Iivzi-ub36sV-ggeKp0NJlCqUXak6JWIVMotFqRltPmKyKW5nNV7uy7u3Dm_g07QIoLR-4JGPMtm9jhkL0OxuXeuEfsjuDlMbx87DnByyN4eQwvfxo4wcs38HKC95g9XF7cf7tKfRKOdJHB7CDtz0TX9lUD01KIrY3OpZElRHVdZTOUt-vLThmrRa9QCrIXQgvTKQ2RO-qMQfR7wvaHcbCnjJ81rZGVKapOQdzYisrmENyrVuS2tUKV71gSjFLjb7Wog6Y2mLAWNZiwdias0YTvX_T2B7YPdrIfIYJcNp881H8A_V1rfg |
link.rule.ids | 785,786,790,799,27956 |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Web+Information+Systems+and+Mining&rft.au=Li%2C+Xiaole&rft.au=Nie%2C+Lianggang&rft.au=Yin%2C+Jianrong&rft.au=Lu%2C+Yuanlu&rft.atitle=Formal+Construction+of+Secure+Information+Transmission+in+Office+Automation+System&rft.series=Lecture+Notes+in+Computer+Science&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783642334689&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=291&rft.epage=298&rft_id=info:doi/10.1007%2F978-3-642-33469-6_39 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon |