期刊文献+

Ajax及其安全分析 被引量:4

Ajax and its Security Analysis
下载PDF
导出
摘要 Rich Internet Application(简称RIA,丰富互联网应用程序)是一种具有高度互动性和丰富用户体验的网络应用程序,Ajax客户端与服务器端通过异步通信来实现无刷新更新页面,很快成为RIA的主流应用技术。主要讨论了Ajax技术带来的安全隐患,包括客户端的跨域访问、外部实体对服务器访问和中间人攻击等,都提出了安全解决方案。 Rich Internet Application(RIA) has better interaction and plenty user experience emerges.AJAX,one of RIA techniques is approbated broadly.Key technique of AJAX is communication way and its client talks with the server in asynchronism.In this way,page updating could be implemented without refurbishment.This paper describes the Security issues of AJAX technology including cross-domain client access,server access to external entities and the man in the middle attacking,have raised security solutions.
作者 杨振华
出处 《计算机安全》 2011年第7期48-50,共3页 Network & Computer Security
关键词 RIA AJAX 中间人攻击 RIA AJAX the man in the middle attacking
  • 相关文献

参考文献5

  • 1Paulson,L.D. Building rich web applications with Ajax[J]. Computer, 2005, 38(10):14-17.
  • 2吴吉义,平玲娣.Web2.0主流应用技术--AJAX性能分析[J].计算机工程与设计,2008,29(8):1913-1914. 被引量:37
  • 3Lihui Lei, Zhenhua Duan. Intergrating AJAX and Web for Cooperative Image Editing[J].lT Professiona Services .2007,9(3):25 29.
  • 4Tomok&zu Fujino. SVG+Ajax+R:a new fr&mework for WebGIS[J]. Comput&tion&l Statistics. 2007, 22(4): 54-37.
  • 5Alessandro Marchetto, Filippo RJcc&, Paolo Tonella study based comparison of web testing techniques applied web applications[J]. International Journal on Software Technology A case to AJAX Tools for Transfer (STTT).2008, 10(6): 10-13.

二级参考文献4

  • 1Justin Gehtland,Dion Almaer,AJAX修炼之道-WEB2.0入门[M].徐峰译.北京:电子工业出版社,2006.
  • 2Brett McLaughlin.Head rush AJAX[M].英文影印版.南京:东南大学出版社,2006.
  • 3Michael Mahemoff. AJAX design patterns[M].英文影印版.南京:东南大学出版社,2006.
  • 4UML软件工程组织.使用AJAX技术开发新一代Web应用程序[EB/OL].http://www.uml.org.cn/AJAX/200602211.htm.

共引文献36

同被引文献34

  • 1欧阳荣彬,王倩宜,刘云峰,李丽.Ajax与新型管理信息系统[J].中山大学学报(自然科学版),2009,48(S1):320-322. 被引量:17
  • 2张晓龙.基于Ajax的Web应用[J].电脑开发与应用,2006,19(8):17-18. 被引量:6
  • 3Ryan Asleson,Nathaniel T Schutta.Ajax基础教程[M].北京:人民邮电出版社,2006.
  • 4Roberts P. Yahoo Worm Demonstrates Ajax Threat [ EB/OL]. http ://www. macworld, com/news/2006/06/16/ajax/ index, php, 2006-06-16.
  • 5Billy Hoffman. Ajax Security Dangers [ EB/OL]. http ://www. spidynamics, com/assets/documents/AJAXdangers, pdf, 2006-12436.
  • 6Scott Guthrie. JSON Hijacking and How ASP. NET Ajax 1.0 Avoids these Attacks. [ EB/OL]. http:Hwww, spidynam- ics. com/assets/documents/AJAXdangers, pdf, 2007-04-04.
  • 7朱超.Ajax安全威胁分析及防御技术研究[D].北京:北京邮电大学,2010.
  • 8ECMA - 262. ECMAScript specification [ S ]. 5th Edition. 瑞士:Ecma国际,2009.
  • 9Dave Crane, Eric Pascarello, Darren James. AJAX in Action [ M ]. A- merican: Manning Publications, 2005.
  • 10HoffmanB,SullivanB.Ajax安全技术[M].张若飞,王铮译.北京:电子工业出版社,2009.

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部