期刊文献+

基于漏洞扫描的安全中间件的设计与实现 被引量:1

The Design and Implemeetation of Security Midderware Based on Vulnerability Scanner
下载PDF
导出
摘要 文章通过对漏洞扫描技术和中间件技术的研究,结合两者的特点,提出了一种基于漏洞扫描的安全中间件的系统结构。该系统具有良好的封装性和可扩充性,并且实现了对多个漏洞扫描插件的控制,屏蔽插件间的差异性,运行中具有高效、稳定、安全的特点。 In the paper, we design and implement a novel security middleware, which is based on vulnerability scanning. This kind of middleware cherishes the character of both vulnerability and middleware technology. And it has good encapsulation and extendibility. The system realizes the control of many vulnerability detection programs and masks their difference. Furthermore, this novel middleware technology can ensure system work more efficient steady and safer.
作者 伍华健
机构地区 玉林师范学院
出处 《微电子学与计算机》 CSCD 北大核心 2006年第11期149-151,154,共4页 Microelectronics & Computer
基金 广西自然科学基金资助项目(桂科基0342060)
关键词 安全中间件 漏洞扫描 端口扫描 Security middleware, Vulnerability scanning, Port scan
  • 相关文献

参考文献4

二级参考文献10

  • 1佘坤,周明天,辛涛.开放DTP核心——TM[J].计算机研究与发展,1997,34(S1):141-144. 被引量:3
  • 2涂航,李莉,李元香.受限环境下RSA密钥对生成的优化[J].小型微型计算机系统,2004,25(12):2203-2206. 被引量:2
  • 3Petraq Papajorgji, Howard W Beck, Jose Luis Braga, An architecture for Developing Service-oriented and Component-based Environmental Models[J/OL], Ecological Modelling, 2004, 179(1): 61-76.
  • 4Jun Ho Park, Myung Jin Lee, Soon Ju Kang. CORBA-based Distributed and Replicated Resource Repository Architecture for Hierarchically Contigurable Home Network[J]. Journal of Systems Architecture, 2005, 51(2): 125-142.
  • 5Nelson Souto Rosa, Paulo Roberto Freire Cunha. A Software Architecture-Based Approach for Formalising Middleware Behaviour [J]. Electronic Notes in Theoretical Computer Science, 2004, 108(13): 39-51.
  • 6Karen Renaud, Judith Bishop, Johnny Lo, Basil Worrall.Algon: From Interchangeable Dis tributed Algorithms to Interchangeable Middleware[J]. Electronic Notes in Theoretical Computer Science, 2005, 114(17): 65-85.
  • 7Sean Baker ,Web Services and CORBA [DB/OL], Lecture Notes in Computer Science, 2002:2519.
  • 8Joint X/Open-NMF Inter-domain Management(XoJIDM)task Force. JIDM Interaction Translation. Edition 4.3 [S].OMC Document Number. telecom, 1998.
  • 9李子臣,戴一奇.二次剩余密码体制的安全性分析[J].清华大学学报(自然科学版),2001,41(7):80-82. 被引量:8
  • 10曾瑶辉,徐沈新,李玉菲.基于RSA算法的非对称密钥加密及签名软件的自主实现[J].计算机应用与软件,2003,20(7):69-70. 被引量:5

共引文献12

同被引文献8

引证文献1

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部