Advertisement

Security for GIS N-tier Architecture

  • Michael Govorov
  • Youry Khmelevsky
  • Vasiliy Ustimenko
  • Alexei Khorev

Abstract

Security is an important topic in the Information Systems and their applications, especially within the Internet environment. Security issue for geospatial data is a relatively unexplored topic in Geographical Information Systems (GIS). This paper analyzes the security solutions for Geographical Information Storage Systems (GISS) within n-tier GIS architecture. The first section outlines the application of the main categories of database security for management spatial data. These categories are then analyzed from a point of view of application within GIS. A File System within Database (FSDB) with traditional and new encryption algorithms has been proposed to be used as a new GISS solution. A FSDB provides more safe and secure storage for spatial files and support centralized authentication and access control mechanism in legacy DBMS. Cryptography solutions as a topic of central importance to many aspects of network security are discussed in detail. This part of the paper describes several traditional and new symmetric, fast and nonlinear encryption algorithms’ implementation with fixed and flexible key sizes.

Keywords

Geographical Information System Spatial Data Encryption Algorithm Access Control Mechanism Secure Assertion Markup Language 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    ArcIMS 4 Architecture and Functionality (2002) An ESRI White PaperGoogle Scholar
  2. [2]
    Biggs NL (1988) Graphs with large girth, Ars Combinatoria 25, pp 73–80Google Scholar
  3. [3]
    Bollobas (1976) Extremal Graph Theory, Academic PressGoogle Scholar
  4. [4]
    Computer Networking: A Top-Down Approach Featuring the Internet (2001) Addison Wesley Longman, Online CourseGoogle Scholar
  5. [5]
    De S, Eastman CM, Farkas C (2002) Secure Access Control in a Multi-user Geodatabase, 22nd Annual ESRI International User ConferenceGoogle Scholar
  6. [6]
    Heimann J (2003) Oracle 9i Application Server, Release 2, SecurityGoogle Scholar
  7. [7]
    iWrapper software (2002) eSpatial, http://www.espatial.com/products/iwrapper.htmGoogle Scholar
  8. [8]
    New name: The Oracle Content Management SDK (2003) http://otn.oracle.com/products/ifs/content.htmlGoogle Scholar
  9. [9]
    OpenGIS Web Map Server Interface Implementation Specification, Revision 1.0.0 (2000) OpenGIS Project Document 00-028Google Scholar
  10. [10]
    Security and ArcIMS (2001) An ESRI White PaperGoogle Scholar
  11. [11]
    Security and the Oracle Internet File System, Oracle Internet File System (2000) Technical White PaperGoogle Scholar
  12. [12]
    System Design Strategies, (2003) An ESRI White PaperGoogle Scholar
  13. [13]
    Ustimenko V (2002) Graphs with special arcs and Cryptography, Acta Applicandae Mathematicae, 74, pp 117–153CrossRefGoogle Scholar
  14. [14]
    Web Services Security: SOAP Message Security 1.0 (2004) OASIS, WSSecurity, http://www.oasis-open.org/committees/documents.phpGoogle Scholar
  15. [15]
    WebLogic Security Framework: Working with Your Security Eco-System (2003) BEA, White PaperGoogle Scholar
  16. [16]
    WebSphere (2003) Web Services Handbook, IBM, Version 5Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Michael Govorov
    • 1
  • Youry Khmelevsky
    • 2
  • Vasiliy Ustimenko
    • 3
  • Alexei Khorev
    • 4
  1. 1.GIS Unit, Department of Geographythe University of the South PacificSuvaFiji Islands
  2. 2.Computing Science Departmentthe University College of the CaribooKamloopsCanada
  3. 3.Department of Mathematics and Computer ScienceThe University of the South PacificSuvaFiji Islands
  4. 4.Institute of Computational Technologies, SBRASNovosibirskRussia

Personalised recommendations