期刊文献+

互联网用户安全登录平台设计 被引量:2

Design of the Secure Login Platform for Internet User
下载PDF
导出
摘要 设计一个开放的互联网用户数据中心Hagza开放平台,对互联网的用户和应用资源进行有效整合.用户可通过该平台快捷地使用各种互联网应用和高效地管理其网络社交关系,而各种网络应用则可借助该平台快速地聚集优质用户.基于表述性状态转移(REST)架构的风格设计,可降低系统实现的复杂性和保证良好的可扩展性,而通过P3P,OAuth,OpenID等复合认证体系,可保证用户隐私和跨平台调用的安全性. A Hagza open platform is designed. It presented an open user-centered internet platform to integrate internet resources of users and applications. With the help of the platform, users could easily use various internet applications and effectively manage their network social relationship, meanwhile applications could quickly accumulate potential users. The platform was schemed as RESTful infrastructure in order to reduce its realization complexity and maintain good scalability. It also secured users' privacy and inter-operation of applications by exploiting combined authentication system of P3P, OAuth and OpenID.
出处 《华侨大学学报(自然科学版)》 CAS 北大核心 2011年第6期638-640,共3页 Journal of Huaqiao University(Natural Science)
基金 国务院侨办科研基金资助项目(10QZR06)
关键词 Hagza开放平台 互联网 安全登录 表述性状态转移 复合认证 Hagza open platform internet secure login representational state transfer composite certification
  • 相关文献

参考文献4

  • 1FIELDING R T. Architectural styles and the design of network-based software architectures[EB/OL]. [2000-03- 16]http..//www. ics. uci. edu/~fielding/pubs/dissertation/top, htm.
  • 2CRANORI.F.P3PWeb隐私[M].技桥,译.北京:清华大学出版社,2004.
  • 3OpenlD group. OpenID authentication 2. 0= Final[-EB/OL]. [-2007-12-6]http://openid. net/spees/openid-authenti- cation-2_0, html.
  • 4HAMMER-LAHAV E. The OAuth 1.0 protocol[EB/OL]. [2009-09-10]http://tools. ietf. org/html/rfc5849.

同被引文献15

  • 1SRIDHAR M,VAIDYA S,YAWAKIAR P. Intrusion detection using keystroke dynamics and :[uzzy logic member- ship {unctions[C] // Proceedings International Conference on Technologies for Sustainable Development. Switzer- land: Bridges Press, 2015,27 (4) = 444-458.
  • 2PARVAT T J, CHANDRA 12. Performance improvement of deep packet inspection for intrusion detection[C]//Pro ceedings 2014 IEEE Global Conference on Wireless Computing and Networking. [S. 1.] :IEEE Press,2014: 224-228.
  • 3PASTRANA S, TAPIAIX)R J E, ORFILA A. Defidnet: A framework for optimal allocation of cyberdefenses in in trusion detection networks[J]. Computer Networks, 2015,80 : 66-88.
  • 4MACDERMOTT A, SHI Q,KIFAYAT K. Collaborative intrusion detection in a federated cloud environment using the Dempster Sharer theory of evidence[C] // European Conference on Information Warfare and Security. ES. 1. 1." Earlybird Press, 2015,195-203.
  • 5PAN Zhiwen, HARIRI S, AI-NASHIF Y. Anomaly based intrusion detection for building automation and control networks[C]//Proceedings of IEEE/ACS International Conference on Computer Systems and Applications. Moroc- co: EasyChair Press, 2015 : 72-77.
  • 6王云,郭外萍,陈承欢.Web项目中的SQL注入问题研究与防范方法[J].计算机工程与设计,2010,31(5):976-978. 被引量:54
  • 7周益宏,陈建勋.浅析基于ASP.NET的网站SQL注入攻击及防范措施[J].计算机安全,2010(6):93-95. 被引量:9
  • 8王伟平,李昌,段桂华.基于正则表示的SQL注入过滤模块设计[J].计算机工程,2011,37(5):158-160. 被引量:16
  • 9石聪聪,张涛,余勇,林为民.一种新的SQL注入防护方法的研究与实现[J].计算机科学,2012,39(B06):60-64. 被引量:10
  • 10马凯,蔡皖东,姚烨.Web2.0环境下SQL注入漏洞注入点提取方法[J].计算机技术与发展,2013,23(3):121-124. 被引量:6

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部