Secure Data Transmission PPT
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar surveyer
Active In SP

Posts: 3,541
Joined: Sep 2010
19-01-2011, 04:53 PM

Kevin Grant

Goals of this Presentation

Understanding Security Mechanisms
Understanding Applicability Statements
Secure Transmission Loop
AS1, AS2, AS3
Product Certification

AS1/AS2/AS3 Standards

Applicability Statements 1 (AS1), 2 (AS2), & 3 (AS3) are the current specifications developed by EDI-INT for transporting data via the Internet.
AS Standards specify how to exchange data, not how to process data.
AS1 defines how to perform secure file transfers via SMTP
AS2 defines how to perform secure file transfers via HTTP
AS3 defines how to perform secure file transfers via FTP
Specify Security Services over a Specific Communication protocol with the introduction of Message Disposition Notifications (MDNs) to complete the Secure Transmission Loop

AS1/AS2/AS3 Options

Encrypted or not encrypted
Signed or unsigned
Receipt or no receipt
Receipt signed, or not signed

Security Mechanisms

Three basic building blocks are used:
Encryption is used to provide confidentiality, can provide authentication and integrity protection
Hash algorithms are used to provide integrity protection, can provide authentication
Digital signatures are used to provide authentication, integrity protection, and non-repudiation

One or more security mechanisms are combined to provide a security service

Hash Functions

Hashing is the transformation of a string of characters into a shorter fixed-length value or key that represents the original string.
It is used to index and retrieve items in a database because it is faster to find the item using the shorter hashed key than to find it using the original value.

For more

Active In SP

Posts: 1
Joined: Feb 2011
28-02-2011, 04:44 PM

hey guys please help me through my secure data transmission project and implimentation

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  secure atm by image processing jaseelati 0 286 10-02-2015, 01:33 PM
Last Post: jaseelati
  mobile data internetworking standards jaseelati 0 333 29-01-2015, 01:15 PM
Last Post: jaseelati
  secure atm by image processing abstract jaseelati 0 351 23-01-2015, 03:08 PM
Last Post: jaseelati
  cloud data protection for the masses project documentation jaseelati 0 335 21-01-2015, 04:19 PM
Last Post: jaseelati
  3d optical data storage technology seminar report jaseelati 0 424 06-01-2015, 04:47 PM
Last Post: jaseelati
  3d optical data storage technology seminar report jaseelati 0 338 30-12-2014, 03:23 PM
Last Post: jaseelati
  Privacy-Preserving Public Auditing for Secure Cloud Storage seminar ideas 4 1,327 13-09-2014, 02:35 PM
Last Post: Radhika.m
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 144 92,700 13-05-2014, 10:16 AM
Last Post: seminar project topic
  Towards Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks seminar ideas 11 3,979 02-04-2014, 12:50 PM
Last Post: Guest
  Towards Secure and Dependable Storage Services in Cloud Computing FULL REPORT seminar ideas 5 4,152 24-03-2014, 02:51 PM
Last Post: seminar project topic