Skip to main content

Security for GIS N-tier Architecture

  • Conference paper
Book cover Developments in Spatial Data Handling

Abstract

Security is an important topic in the Information Systems and their applications, especially within the Internet environment. Security issue for geospatial data is a relatively unexplored topic in Geographical Information Systems (GIS). This paper analyzes the security solutions for Geographical Information Storage Systems (GISS) within n-tier GIS architecture. The first section outlines the application of the main categories of database security for management spatial data. These categories are then analyzed from a point of view of application within GIS. A File System within Database (FSDB) with traditional and new encryption algorithms has been proposed to be used as a new GISS solution. A FSDB provides more safe and secure storage for spatial files and support centralized authentication and access control mechanism in legacy DBMS. Cryptography solutions as a topic of central importance to many aspects of network security are discussed in detail. This part of the paper describes several traditional and new symmetric, fast and nonlinear encryption algorithms’ implementation with fixed and flexible key sizes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ArcIMS 4 Architecture and Functionality (2002) An ESRI White Paper

    Google Scholar 

  2. Biggs NL (1988) Graphs with large girth, Ars Combinatoria 25, pp 73–80

    Google Scholar 

  3. Bollobas (1976) Extremal Graph Theory, Academic Press

    Google Scholar 

  4. Computer Networking: A Top-Down Approach Featuring the Internet (2001) Addison Wesley Longman, Online Course

    Google Scholar 

  5. De S, Eastman CM, Farkas C (2002) Secure Access Control in a Multi-user Geodatabase, 22nd Annual ESRI International User Conference

    Google Scholar 

  6. Heimann J (2003) Oracle 9i Application Server, Release 2, Security

    Google Scholar 

  7. iWrapper software (2002) eSpatial, http://www.espatial.com/products/iwrapper.htm

    Google Scholar 

  8. New name: The Oracle Content Management SDK (2003) http://otn.oracle.com/products/ifs/content.html

    Google Scholar 

  9. OpenGIS Web Map Server Interface Implementation Specification, Revision 1.0.0 (2000) OpenGIS Project Document 00-028

    Google Scholar 

  10. Security and ArcIMS (2001) An ESRI White Paper

    Google Scholar 

  11. Security and the Oracle Internet File System, Oracle Internet File System (2000) Technical White Paper

    Google Scholar 

  12. System Design Strategies, (2003) An ESRI White Paper

    Google Scholar 

  13. Ustimenko V (2002) Graphs with special arcs and Cryptography, Acta Applicandae Mathematicae, 74, pp 117–153

    Article  Google Scholar 

  14. Web Services Security: SOAP Message Security 1.0 (2004) OASIS, WSSecurity, http://www.oasis-open.org/committees/documents.php

    Google Scholar 

  15. WebLogic Security Framework: Working with Your Security Eco-System (2003) BEA, White Paper

    Google Scholar 

  16. WebSphere (2003) Web Services Handbook, IBM, Version 5

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Govorov, M., Khmelevsky, Y., Ustimenko, V., Khorev, A. (2005). Security for GIS N-tier Architecture. In: Developments in Spatial Data Handling. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-26772-7_6

Download citation

Publish with us

Policies and ethics