Research Article
Research on the Design of Government Affairs Platform in the Context of Big Data
Table 1
Analysis of transport layer security and XML security.
| Security requirements | SSL | XML encryption | XML digital signature | Firewall |
| Confidentiality | Point-to-point confidentiality | End-to-end machine confidential | | | Authentication | | Send/receive | Verified | | Integrity | Using MAC | Using MAC and digital sign | ID authentication | Name authentication | Authorization | | | | Authorize | Nonrepudiation | | | Signature | |
|
|