Secure Data Transmission PPT
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar surveyer
Active In SP
**

Posts: 3,541
Joined: Sep 2010
#1
19-01-2011, 04:53 PM





EDI-INT AS1, AS2, AS3
Kevin Grant


Goals of this Presentation

Understanding Security Mechanisms
Understanding Applicability Statements
MDNs
Secure Transmission Loop
AS1, AS2, AS3
Product Certification

AS1/AS2/AS3 Standards

Applicability Statements 1 (AS1), 2 (AS2), & 3 (AS3) are the current specifications developed by EDI-INT for transporting data via the Internet.
AS Standards specify how to exchange data, not how to process data.
AS1 defines how to perform secure file transfers via SMTP
AS2 defines how to perform secure file transfers via HTTP
AS3 defines how to perform secure file transfers via FTP
Specify Security Services over a Specific Communication protocol with the introduction of Message Disposition Notifications (MDNs) to complete the Secure Transmission Loop

AS1/AS2/AS3 Options

Encrypted or not encrypted
Signed or unsigned
Receipt or no receipt
Receipt signed, or not signed

Security Mechanisms

Three basic building blocks are used:
Encryption is used to provide confidentiality, can provide authentication and integrity protection
Hash algorithms are used to provide integrity protection, can provide authentication
Digital signatures are used to provide authentication, integrity protection, and non-repudiation

One or more security mechanisms are combined to provide a security service

Hash Functions

Hashing is the transformation of a string of characters into a shorter fixed-length value or key that represents the original string.
It is used to index and retrieve items in a database because it is faster to find the item using the shorter hashed key than to find it using the original value.

For more


Reply
swapmax411
Active In SP
**

Posts: 1
Joined: Feb 2011
#2
28-02-2011, 04:44 PM

hey guys please help me through my secure data transmission project and implimentation
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  secure atm by image processing jaseelati 0 274 10-02-2015, 01:33 PM
Last Post: jaseelati
  mobile data internetworking standards jaseelati 0 312 29-01-2015, 01:15 PM
Last Post: jaseelati
  secure atm by image processing abstract jaseelati 0 341 23-01-2015, 03:08 PM
Last Post: jaseelati
  cloud data protection for the masses project documentation jaseelati 0 317 21-01-2015, 04:19 PM
Last Post: jaseelati
  3d optical data storage technology seminar report jaseelati 0 403 06-01-2015, 04:47 PM
Last Post: jaseelati
  3d optical data storage technology seminar report jaseelati 0 322 30-12-2014, 03:23 PM
Last Post: jaseelati
  Privacy-Preserving Public Auditing for Secure Cloud Storage seminar ideas 4 1,299 13-09-2014, 02:35 PM
Last Post: Radhika.m
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 144 92,342 13-05-2014, 10:16 AM
Last Post: seminar project topic
  Towards Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks seminar ideas 11 3,927 02-04-2014, 12:50 PM
Last Post: Guest
  Towards Secure and Dependable Storage Services in Cloud Computing FULL REPORT seminar ideas 5 4,121 24-03-2014, 02:51 PM
Last Post: seminar project topic