The Experts below are selected from a list of 12 Experts worldwide ranked by ideXlab platform
Usman Ependi - One of the best experts on this subject based on the ideXlab platform.
-
THE SECURITY MODEL FOR DATA Exchange USING XML ENCRYPTION AND SECURITY TOKEN IN Web Service
2013Co-Authors: Ari Ari Muzakir, Usman EpendiAbstract:Keywords: Data Exchange, Web Service, xml encryption, username token Abstract. Nowadays, security being the important issue in information and technology era, especially when it use the internet. The Web Service who has XML technology on their Exchange data is implement the use of public-key cryptographic techniques as well as the insertion of username tokens to the authenticity of the sender as a means of securing data. Implementation has been done using the security library will facilitate in building a Web Service security. XML Encryption that uses RSA algorithm with a key length of 1024 bits is able to provide protection against the transmission of data between the client and the Web server to the database Service. Username token role in providing the authenticity of the message is to use RSA-SHA1 cryptography. The results obtained are SOAP request message is encrypted and decrypted properly afford and integrity, authenticity, and security of data is maintained.
Ari Ari Muzakir - One of the best experts on this subject based on the ideXlab platform.
-
THE SECURITY MODEL FOR DATA Exchange USING XML ENCRYPTION AND SECURITY TOKEN IN Web Service
2013Co-Authors: Ari Ari Muzakir, Usman EpendiAbstract:Keywords: Data Exchange, Web Service, xml encryption, username token Abstract. Nowadays, security being the important issue in information and technology era, especially when it use the internet. The Web Service who has XML technology on their Exchange data is implement the use of public-key cryptographic techniques as well as the insertion of username tokens to the authenticity of the sender as a means of securing data. Implementation has been done using the security library will facilitate in building a Web Service security. XML Encryption that uses RSA algorithm with a key length of 1024 bits is able to provide protection against the transmission of data between the client and the Web server to the database Service. Username token role in providing the authenticity of the message is to use RSA-SHA1 cryptography. The results obtained are SOAP request message is encrypted and decrypted properly afford and integrity, authenticity, and security of data is maintained.
Deng Yue - One of the best experts on this subject based on the ideXlab platform.
-
WebGIS Service Based on Microsoft.Net
Journal of Heilongjiang Institute of Technology, 2004Co-Authors: Deng YueAbstract:This paper introduces the structure of Microsoft.Net Web Service and describes how to use the interoperability of this technique to develop WebGIS Service. Finally a GIS data Exchange Web Service is provided to show how to realize a Web Service.
Wang Qiucai - One of the best experts on this subject based on the ideXlab platform.
-
Remote Monitoring System for Tunnel Based on Internet
Computer Communications, 2006Co-Authors: Wang QiucaiAbstract:Aiming at the limitation of traditional centralized monitoring system for tunnel,this paper presents a remote monitoring system based on Internet and PROFIBUS. The principle of monitoring system is also introduced.The key technologies are described from four aspects including tunnel field monitoring system,real-time data-Exchange,Web Service and displaying interface.Last,the function of Web Service is realized by ASP.NET technology.Remote users can monitor and control tunnel's equipments through the browser,which overcomes the shortages of traditional tunnel monitoring system.
Tzu Hsuan Lin - One of the best experts on this subject based on the ideXlab platform.
-
Development of an Internet of Civil Infrastructure Framework
Advanced Materials Research, 2013Co-Authors: Der-cherng Liaw, Tzu Hsuan LinAbstract:Nowadays, the civil infrastructures are subjected to disasters such as fires, floods, and earthquakes. Recently, the novel concept of Internet of Things (IoT) is known to be useful for managing crisis situations via providing a good disaster management and emergency response information. This paper addresses the civil infrastructure issue of health monitoring and disaster management by introducing IoT technology. A concept of internet of civil infrastructure (IoCI) framework is also proposed in this paper. The proposed framework is a three layered architecture. Among them, the top layer is a wireless sensor network (WSN) client which is deployed in civil infrastructure to perform specific tasks such as sensing, data processing, and acknowledgement. The middle layer is an information Exchange Web Service (IEWS) through which all the information such as sensor data, structural health and location are Exchanged, while the remaining layer is a mobile device based information platform for data representation, control, and event notification.