Secure Data Transmission PPT
#1




EDI-INT AS1, AS2, AS3
Kevin Grant


Goals of this Presentation

Understanding Security Mechanisms
Understanding Applicability Statements
MDNs
Secure Transmission Loop
AS1, AS2, AS3
Product Certification

AS1/AS2/AS3 Standards

Applicability Statements 1 (AS1), 2 (AS2), & 3 (AS3) are the current specifications developed by EDI-INT for transporting data via the Internet.
AS Standards specify how to exchange data, not how to process data.
AS1 defines how to perform secure file transfers via SMTP
AS2 defines how to perform secure file transfers via HTTP
AS3 defines how to perform secure file transfers via FTP
Specify Security Services over a Specific Communication protocol with the introduction of Message Disposition Notifications (MDNs) to complete the Secure Transmission Loop

AS1/AS2/AS3 Options

Encrypted or not encrypted
Signed or unsigned
Receipt or no receipt
Receipt signed, or not signed

Security Mechanisms

Three basic building blocks are used:
Encryption is used to provide confidentiality, can provide authentication and integrity protection
Hash algorithms are used to provide integrity protection, can provide authentication
Digital signatures are used to provide authentication, integrity protection, and non-repudiation

One or more security mechanisms are combined to provide a security service

Hash Functions

Hashing is the transformation of a string of characters into a shorter fixed-length value or key that represents the original string.
It is used to index and retrieve items in a database because it is faster to find the item using the shorter hashed key than to find it using the original value.

For more


Reply
#2
hey guys please help me through my secure data transmission project
Reply
#3

to get information about the topic "secure data transmis" full report ppt and related topic refer the page link bellow


http://studentbank.in/report-secure-data...ission-ppt

http://studentbank.in/report-secure-data...ganography
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: gatool exemple, ppt on secure data transmission and authentication, secure data transmission, as3 gyroscope, as3 iterate, kevin bacon, secure data transmission ppt,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Block Chain and Data Science jntuworldforum 0 7,960 06-10-2018, 12:15 PM
Last Post: jntuworldforum
  Data Encryption Standard (DES) seminar class 2 9,332 20-02-2016, 01:59 PM
Last Post: seminar report asees
  Skin Tone based Secret Data hiding in Images seminar class 9 6,980 23-12-2015, 04:18 PM
Last Post: HelloGFS
Brick XML Data Compression computer science crazy 2 2,377 07-10-2014, 09:26 PM
Last Post: seminar report asees
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 116 82,029 03-04-2014, 11:39 PM
Last Post: seminar report asees
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 14,786 30-03-2014, 04:40 AM
Last Post: Guest
  GREEN CLOUD -A Data Center Approach computer topic 0 1,530 25-03-2014, 10:13 PM
Last Post: computer topic
  3D-OPTICAL DATA STORAGE TECHNOLOGY computer science crazy 3 8,499 12-09-2013, 08:28 PM
Last Post: Guest
  Security in Data Warehousing seminar surveyer 3 9,836 12-08-2013, 10:24 AM
Last Post: computer topic
  data warehousing concepts project topics 7 7,112 05-02-2013, 12:00 PM
Last Post: seminar details

Forum Jump: