The Analysis of XML Technology in Network Security

@article{Jing2010TheAO,
  title={The Analysis of XML Technology in Network Security},
  author={Zhou Xian Jing},
  journal={2010 International Symposium on Intelligence Information Processing and Trusted Computing},
  year={2010},
  pages={701-704}
}
  • Zhou Xian Jing
  • Published 2010 in
    2010 International Symposium on Intelligence…
This paper described the current network of primary language XML in network applications, introduced its own XML language features and development to illustrate aspects of XML technology in the application of network security and significance. The network security is a systems engineering which is need to carefully consider the security needs of the system, and a variety of security technologies, such as passwords and technology combine to produce a highly efficient, universal, secure network… CONTINUE READING

Citations

Publications citing this paper.
Showing 1-3 of 3 extracted citations

Privacy and security gaps in mitigating Cyber crime: The review

2016 2nd International Symposium on Agent, Multi-Agent Systems and Robotics (ISAMSR) • 2016
View 10 Excerpts
Highly Influenced

A survey on XML security

2013 International Conference on Recent Trends in Information Technology (ICRTIT) • 2013
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-5 of 5 references

The Component Code of Each Call Analyze and Compare Based on .NET

2009 Third International Symposium on Intelligent Information Technology Application • 2009

The Examinational Technology of Invasion Analysis Based on Network Security

2009 IITA International Conference on Control, Automation and Systems Engineering (case 2009) • 2009

The System Safety Research and Design based on .NET Framework”[J

Zhou jing liu quanju
Communications Technology.2008-5 • 2008

Exploration of Data Transfer Mode between ASP and ASP.NET Page”[J

Zhou jing
Microcomputer Information • 2006

Asp.net Technology Development

Li Xiao, Shuan loose, ZouJianFeng
[J]. 2005 and January • 2005

Similar Papers

Loading similar papers…