期刊文献+

浅谈ASP的安全漏洞与应对策略 被引量:2

Qinghai University For Nationalities,Department of Computer Science and Technology Vulnerabilities of ASP and Strategies
下载PDF
导出
摘要 从ASP程序设计、数据库、防范远程注入三个方面对ASP的安全技术进行分析和总结,并指出ASP技术中存在的安全隐患。ASP是微软推出的服务器端脚本环境,它把脚本、HTML、ActiveX组件有机地结合在一起,形成动态、交互、高效的Web服务器应用程序,ASP+Access(或SQL)已成为很多人构建自己网上信息系统的首选方案。虽然ASP具有快速开发能力,由于ASP自身存在的安全漏洞,在编写程序的时候稍不小心就会给自己的网站留下很大的安全隐患。试图从ASP程序设计、数据库、防范远程注入三个方面对ASP的安全技术进行分析并提出建议。 ASP security environment analysis Abstract Article from the overall situation of the ASP system,from the Remote injection,database client,ASP Programming ASP three areas of security technology for the analysis and conclusion,and pointed out it's security problem.Introduction ASP is a Microsoft server-side scripting environment,it is the script,HTML,ActiveX components combined to form a dynamic,interactive and efficient Web server applications.ASP + Access(or SQL) program has become first enterprises to build their own online information system of choice for the program.Although the ASP has the ability to develop a web quickly,but for itself's security vulnerabilities,When writing programs in a little careless to their site will leave a great security risk.This paper attempts to client from the Remote injection,database client,ASP Programming ASP three areas of security technology for the analysis.
作者 黄鑫源
出处 《电脑知识与技术(过刊)》 2011年第4X期2540-2541,共2页 Computer Knowledge and Technology
关键词 ASP 数据库 远程注入 ASP database remote injection
  • 相关文献

同被引文献34

  • 1章慧,王留洋,俞杨信.浅谈Client/Server体系结构及发展[J].淮阴工学院学报,2001,10(4):13-15. 被引量:3
  • 2王艳红.ASP安全技术研究[J].北京电子科技学院学报,2004,12(4):60-63. 被引量:1
  • 3白艳玲.ASP安全问题及解决方案[J].郑州铁路职业技术学院学报,2006,18(4):43-45. 被引量:3
  • 4赫捷,陈万青.2012中国肿瘤登记年报[M].北京:军事医学科学出版社,2012:12-25.
  • 5Toyotaro S, Scott T, Michiaki T, et al. Performance comparison of web service engines in PHP, Java, and C[C]//2008 IEEE International Conference on Web Services. Beijing: ICWS, 2008: 385-392.
  • 6Hauzar D, Kofrofi J. On security analysis of PHP web applications[C]//2012 IEEE 36th International Conference on Computer Software and Applications Workshops. Izmir: COMPSACW, 2012: 577-582.
  • 7Chris S. Essential PHP security[M]. America: O'Reilly Media, Inc, 2006: 25-27.
  • 8Bayley JP, Launonen V, Tomlinson IP. The FH mutation database: an online database of fumarate hydratase mutations involved in the MCUL (HLRCC) tumor syndrome and congenital fumarase deficiency[J]. BMC Med Genet, 2008, 25(9): 20.
  • 9Yap KY, Ho YX, Chui WK, et al. Harnessing the Intemet cloud for managing drug interactions with chemotherapy regimens in patients with cancer suffering from depression[J]. Acta Oncol, 2010, 49(8): 1235-1245.
  • 10Rouney A. Foundations of Java for ABAP programmers[M]. Apress, 2006: 133-144.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部