Skip Nav Destination
ASME Press Select Proceedings
International Conference on Computer Technology and Development, 3rd (ICCTD 2011)
ISBN:
9780791859919
No. of Pages:
2000
Publisher:
ASME Press
Publication date:
2011
eBook Chapter
8 The Analysis of the Security Problem in Web
By
Wenju Gao
,
Wenju Gao
Department of Electronic Engineering,
Changchun Institute of Engineering Technology
, Changchun, 130117
; gaowj913@sina.com
Search for other works by this author on:
Yueou Ren
,
Yueou Ren
Department of Electronic Engineering,
Changchun Institute of Engineering Technology
, Changchun, 130117
Search for other works by this author on:
Qiuju Li
,
Qiuju Li
Department of Electronic Engineering,
Changchun Institute of Engineering Technology
, Changchun, 130117
Search for other works by this author on:
Mingqian Wang
,
Mingqian Wang
Department of Electronic Engineering,
Changchun Institute of Engineering Technology
, Changchun, 130117
Search for other works by this author on:
Zhe Li
Zhe Li
Department of Electronic Engineering,
Changchun Institute of Engineering Technology
, Changchun, 130117
Search for other works by this author on:
Page Count:
5
-
Published:2011
Citation
Gao, W, Ren, Y, Li, Q, Wang, M, & Li, Z. "The Analysis of the Security Problem in Web." International Conference on Computer Technology and Development, 3rd (ICCTD 2011). Ed. Zhou, J. ASME Press, 2011.
Download citation file:
Internet technology is applied in daily life more and more extensively, thus, the corresponding security problems relating with internet are more and more serious. The attack to the web is now mainly from service software nowadays instead of WWW system structure. In this article, web service software and its threat to the security environment of the host computer are discussed, and the correct researching method to the problems pointed out above are presented.
Topics:
Security
Abstract
Key Words
1. Introduction
2. WWW System Structure and its Relation to the Security Problem
3. WWW Safe Problems and Principle of Attacking
4. The Research of Web Safe Problem
5. Conclusions
References
This content is only available via PDF.
You do not currently have access to this chapter.
Email alerts
Related Chapters
General and Historical Information
Pipeline Integrity Assurance: A Practical Approach
Hydro Tasmania — King Island Case Study
Energy and Power Generation Handbook: Established and Emerging Technologies
An Attribute Based Partial Blind Signature Scheme with Provable Security
International Conference on Control Engineering and Mechanical Design (CEMD 2017)
Nonlinear Fuzzy Comprehensive Evaluation and Its Application
International Conference on Electronics, Information and Communication Engineering (EICE 2012)
Related Articles
The Need for Integrated Cybersecurity and Safety Training
ASME J of Nuclear Rad Sci (October,2018)
Intrusion Detection System for Cyber-Manufacturing System
J. Manuf. Sci. Eng (March,2019)
Analyses of Feedwater Trip With SBO Sequence of VVER1000 Reactor
ASME J of Nuclear Rad Sci (October,2016)