期刊文献+

一种可扩展Web模型安全机制 被引量:2

Extensible Web Model Security Mechanism
下载PDF
导出
摘要 Web扩展对于安全的一贯性具有综合影响。定义了影响安全模型的Web入侵、网络入侵与Gadget入侵的行为能力。提出了Web扩展模型具有Web概念的浏览器、服务器、协议的类、属性与方法。使用该扩展模型研究了重定向请求到入侵者服务器的交叉区域资源共享安全机制,以及相同区域源网站的引用验证安全机制,分析了两个机制的脆弱性,并提出了忽略重定向请求与禁止出口引用的解决方案。 Web extensions for security consistency have a comprehensive impact. It defines the effect of security model capacity in the Web Attacker, Network Attacker and Gadget Attacker. Web extension model proposed the concept of a Web browser, server, protocol type, properties and methods. Finally, it studied using the extended model intruder server redirects the request to cross-origin resource sharing security mechanisms, and the same-origin site refer validation security mechanism, analysis of the vulnerability of the two mechanisms, and proposes ignore redirect request and suppress all outgoing refer solutions.
作者 何旭
出处 《计算机系统应用》 2012年第8期89-93,共5页 Computer Systems & Applications
关键词 重定向 交叉区域 资源共享 引用验证 安全机制 redirect cross-origin resource sharing refer validation security mechanism
  • 相关文献

参考文献11

  • 1陈天平,许世军,张串绒,郑连清.基于攻击检测的网络安全风险评估方法[J].计算机科学,2010,37(9):94-96. 被引量:14
  • 2Van Kesteren A. Cross-origin resource sharing, http://dev.w3. org/2009/waf/access-eontrol,2009.
  • 3Mitchell JC, Roy A. Protocol Composition Logic. Electronic Notes in Theoretical Computer Science, 2007,172:311-358.
  • 4Barth A, Jackson C, Mitchell J. Securing fi'ame communica- tion in browser. Proceedings of the 17th conference on Security symposium. USENIX Association,2008.17-30.
  • 5Gordon A, Pucella R. Validating a web service security abstraction by typing. Formal Aspects of Computing, 2005,17(3):277-318.
  • 6Klose T. Confused deputy attack on cors. http://lists.w3. org/Archives/Public/public-webapps/2009AprJun/1324.html, 2009.
  • 7Akhawe D, Barth A, Lam PE. Web security model imple- mentation, http://code.google.com/p/websecmodel,2010.
  • 8Barth A, Caballero J, Song D o Secure content sniffing for web browsers, or how to stop papers fi'om reviewing themselves. Proceedings of the 2009 30th IEEE Symposium on Security and Privacy:360-371.
  • 9Stamm S. Content security policy, https://wiki.mozilla.org/ Security/CSP/Spec, 2009.
  • 10Magazinius J, Askarov A, Sabelfeld A. A lattice-based approach to mashup security. The 5th ACM Symposium on Information, Computer and Communications Security. ACM,2010.

二级参考文献8

共引文献13

同被引文献22

  • 1季庆光,冯登国.对几类重要网络安全协议形式模型的分析[J].计算机学报,2005,28(7):1071-1083. 被引量:23
  • 2Kark, K., Penn, J., Dill, A. 2008 CISO priorities: The right objectives but the wrong focus[J]. Le Magazine de la Srcurit6 Informatique, April 2009.
  • 3Friedberg, J. Intemet fraud battlefield[Z], http: // www.ftc.gov/ bcp/ workshops/ proofpositive/ Battlefield_ Overview.pdf. April 2007.
  • 4Barth, A., Rubinstein, B.I.P., Sundararajan, M. A learn ing-based approach to reactive security[Z], http: //arxiv.org /abs/0912.1155, 2009.
  • 5Cavusoglu, H., Raghunathan, S., Yue, W. Decision-th eoretic and game-theoretic approaches to IT security invest ment[J]. Journal of Management Information Systems, 2008, 25 (2) : 281-304.
  • 6Miura-Ko, R., Bambos, N.: SecureRank. A risk-based vulnerability management scheme for computing infrastmctures[C]. In: Proceedings of IEEE International Conference on Communications, 2007: 1455-1460.
  • 7Fultz, N., Grossklags, J. Blue versus Red: Towards a model of distributed security attacks. Proceedings of the Thi rteenth International Conference Financial Cryptography and Data Security, February 2009.
  • 8Beard, C. Introducing Test Pilot[Z]. http. //labs.mozilla. com/2008/03/introducing-test-pilot/. March 2008.
  • 9HTTP over TLS [EB/OL]. (2000-05-01) [2014-03-10] http ://www. ietf. org/rfc/rfc2818.txt.
  • 10Intemet X.509 public key infrastructure certificate and certificate revocation list(CRL)profile [EB/OL]. (2008- 05-01 )[2014-03-10 ].http://tools.ietf. org/html/rfc5280.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部