Research on Security Technology based on WEB Application
Fanxing Kong
2016
Abstract
This article described the relevant technologies of web security, thoroughly analyzed the application security of Web in three aspects of security threats of Web client, security threats of Web server, security threats of data transmission, and accordingly studied the security technology based on WEB application. Hope the elaboration of this article could provide some reference to the relevant personnel in the field.
References
- Xiaojie X, Yang X, Shuo J., Research and Design of Web Application Firewall Based on Feature Matching. Netinfo security, (11)53-59,2015
- Ziqian W, Bo W., Research on technology taking use of vulnerability of information security in Web application system. Electronic Product Reliability and Environmental Testing, (6):30-33, 2015
- Dongjiao Z, Ping W., Analysis on the security technology of Java Web application program. Computer fan, (3):48-49,2016
- Juan D, Yang X, Yuwei M., Research and design of audit system of security log based on Web application. Netinfo security, (10):70-76,2014
- Yi S, Dongyun L, Wenjie W., Research on the key technology of security testing platform of Web application program. Information Security and Technology, (1):29-32, 2014,
- Wang X.,Desing of Secure Identity Authentication System Based on JAAS in the Web Application System. Journal of Beijing University of Civl Engineering and Architecture, 24(2):55-59,2008
- Yubei Y., Application security of PGP encryption technology based on WEB in mail system, Network Security Technology & Application,(6):38-40,2015
- Chuan L., Research on Application of Web J2EE system identity authentication security mechanism based on Unix authentication. Journal of Chongqing University of Arts and Sciences,(4):65-67,2010
- Chengyu H. Research on the protection method of Web Java application software, Software Guide,(11):57- 58,2011
- Yongxiang W, On WEB website security optimization. Network Security Technology & Application,(5):136- 1137,2014
- Linhai Y, Binying H., Research on the content of Web code security artificial audit, Jiangxi Science,(4):536- 538,2014
- Hung-Bin C, Izhak Rubin,Ofer Hadar., Scalable Video Multicast for Multi-Cell Cellular Wireless Networks. Journal of Communications, 10(9):715-727, 2015
Paper Citation
in Harvard Style
Kong F. (2016). Research on Security Technology based on WEB Application . In ISME 2016 - Information Science and Management Engineering IV - Volume 1: ISME, ISBN 978-989-758-208-0, pages 367-370. DOI: 10.5220/0006450603670370
in Bibtex Style
@conference{isme16,
author={Fanxing Kong},
title={Research on Security Technology based on WEB Application},
booktitle={ISME 2016 - Information Science and Management Engineering IV - Volume 1: ISME,},
year={2016},
pages={367-370},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006450603670370},
isbn={978-989-758-208-0},
}
in EndNote Style
TY - CONF
JO - ISME 2016 - Information Science and Management Engineering IV - Volume 1: ISME,
TI - Research on Security Technology based on WEB Application
SN - 978-989-758-208-0
AU - Kong F.
PY - 2016
SP - 367
EP - 370
DO - 10.5220/0006450603670370