期刊文献+

Java Web中的安全保障机制研究 被引量:2

Research on Safety Control Mechanism of Java Web
下载PDF
导出
摘要 本文主要阐述Java Web应用中的安全保障机制,包括操作系统安全控制(OS Security)、身份验证(Authentication)、授权(Authorization)、完整性(Integrity)以及审计(Auditing)等。 This article mainly elaborates safety control mechanism of Java Web application,including the operating system safety control,identification authentication,authorization,data integrity as well as audits and so on.
出处 《计算机与现代化》 2010年第12期142-144,共3页 Computer and Modernization
关键词 JAVA WEB 安全保障 身份验证 授权 完整性 审计 Java Web safety control authentication authorization integrity auditing
  • 相关文献

参考文献13

  • 1Stinson D R. Cryptography-Theory and Practices[ M]. CRC Press, 1995.
  • 2Menezes A J,Oorsehot Van P,Vanstone S A. Handbook of Applied Cryptography[ M]. CRC Press, 1997.
  • 3Logging Services. Log4j [ EB/OL ] . http ://jakarta. apache. org/log4j/docs/index, htm1,2010-06-20.
  • 4Bruce Schneider. Applied Cryptography[ M ]. John Wiley & Sons, Inc., 1996.
  • 5Yen S M, Laih C S. Improved digital signature algorithm [ J ]. IEEE Trans. On Computers, 1995,44 ( 5 ) :729-730.
  • 6Arto Salomma.公匙密码学[M].丁存生,单炜娟译.北京:国防工业出版社,1998.
  • 7Ahn G J, Rrvi Sandhu. Rolebased authorization constrans specification [ J ]. ACM Transcations on Information and System Security ;2000,3 (4) :207-226.
  • 8Sylvia Osborn, Yuxia Guo. Modeling users in rolebased access control [ C ]//Processdings of the 5th ACM Workshop on Rolebased Access Control(RBAC00). Berlin,2000.
  • 9汪厚祥,李卉.基于角色的访问控制研究[J].计算机应用研究,2005,22(4):125-127. 被引量:61
  • 10[美]JessGarms,DanielSomerfield.Java安全性编程指南[M].庞南,管和昌,陈立志,等译.北京:电子工业出版社.2002.

二级参考文献14

  • 1Ravi S Sandhu, David Ferraiolo,Richard Kuhn. The NIST Model for Role-based Access Control: Towards an Unified Standard [ J/OL ].ACM. 2000.47-63.
  • 2David F Feraiolo, Ravi Sandhu,Serban Gavrila, et al. Proposed NIST Standard for Role-based Access Control[ J]. ACM Transactions on Information and System Security, 2001, (3) :224-274.
  • 3Ravi Sandhu, Edward J Coyne. Roie-based Access Control Models[ J]. Computer,1996, (2) :38-47.
  • 4Sandhu R, Bhamidipati V, Munawer Q. The ARBAC97 Model for Role-based Administration of Roles[ J]. ACM Trans. on Information and Systems Security, 1999, ( 1 ) : 105-135.
  • 5Sylvia Osbom, Yuxia Guo. Modeling Users in Role-based Access Control[ C]. Berlin:Proceedings of the 5th ACM Workshop on Rolebased Access Control( RBAC-00), 2000.26-27.
  • 6Ahn GJ, Arvisandhu. Role-based Authorization Constrains Specification [ J]. ACM Transcations on Information and System Security,2002, ( 3 ) :207-226.
  • 7马建平,余祥宣,洪帆,张江陵.基于角色的安全策略[J].计算机研究与发展,1998,35(5):447-450. 被引量:15
  • 8李建萍,郭学理,吕宏辉.WWW安全问题的分析与防范策略[J].计算机工程,1999,25(2):54-56. 被引量:6
  • 9施景超,孙维祥,许满武.基于角色的存取控制及其实现[J].计算机应用研究,2000,17(6):13-15. 被引量:48
  • 10李新晖,陈梅兰.信息安全技术的研究发展与应用[J].计算机与现代化,2000(4):28-33. 被引量:5

共引文献66

同被引文献17

  • 1Christopher Steel,Ramesh Nagappan,RayLai.陈秋萍,罗邓,袁国忠,等译.安全模式[M].北京:机械工业出版社,2006.
  • 2Java深度历险(九)-Java安全[EB/OL].2011.http://www.infoq.com/cn/articles/cf-java-security.
  • 3CayS.Horstmann,GaryComell,陈吴鹏,王浩,姚建平,译.CoreJava,Volume2:Advan-cedFeatures[M]:北京:机械工业出版社,2008.
  • 4ScottOaks,林琪,译.Javasecurity,2nded.[M].北京:中国电力出版社,2009.
  • 5Oracle and/or Its Affiliates. Phoneme[EB/OL]. http://java.net/projects/phoneme/, 2012-12-21..
  • 6[美]Bill Venners. 深入Java虚拟机(第2版)[M]. 曹晓钢,蒋靖译. 北京:机械工业出版社, 2005..
  • 7Sun Microsystems, Inc. White Paper on KVM and the Connected, Limited Device Configuration [EB/OL]. http://www.oracle.com/technetwork/java/javame-old/kvmwp-150240.pdf, 2000-03-19..
  • 8Oracle. Java ME Technology-CDC [EB/OL]. http://www.oracle.com/technetwork/java/javame/tech/cdc-137762.html, 2012-12-21..
  • 9Klingsheim A N, Moen V, Hole K J. Challenges in securing networked J2ME applications [J]. Computer, 2007,40(2):24-30..
  • 10余秋冬,徐辉.基于J2ME的向手机移植游戏软件方法及其实现[J].计算机应用与软件,2009,26(11):134-136. 被引量:3

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部