Research Article
Research on the Design of Government Affairs Platform in the Context of Big Data
Table 1
Analysis of transport layer security and XML security.
| | Security requirements | SSL | XML encryption | XML digital signature | Firewall |
| | Confidentiality | Point-to-point confidentiality | End-to-end machine confidential | | | | Authentication | | Send/receive | Verified | | | Integrity | Using MAC | Using MAC and digital sign | ID authentication | Name authentication | | Authorization | | | | Authorize | | Nonrepudiation | | | Signature | |
|
|