1University College London, 26 Gordon Square, London, WC1.The bentham project [J/OL]. URL: http:∥www. ucl.ac.uk/Bentham-Project/index.htm.
2The internet encyclopedia of philosophy [J/OL]. URL: http:∥www. utm.edu/research/iep/m/millj s.htm#Utilitarianism.
3Denning, Dorothy E. Concerning hackers who break into computer systems[J/OL].Paper presented at the 13th National Computer Security Conference, Washington, 1990, (10): 1-4. URL:http:∥www. cpsr. org/cpsr/privacy/crime/denning.hackers.html.
4Martin M, Lam MS. Automatic generation of XSS and SQL injection attacks with goal-directed model checking. Proc. of the 17th Conference on Security Symposium Jul. 2008.
5Kirda E, Kruegel C, Vigna G, Jovanovic P. Noxes: a client-side solution for mitigating cross-site scripting attacks. Proc. of the 2006 ACM Symposium on Applied computing Apr. 2006.
6Jim T, Swamy P, Hicks PM. Defeating script injection attacks with browser-enforced embedded policies. Proc. of the 16th International Conference on World Wide Web May. 2007.
7Grossman J. Cross-site scripting worms and viruses the Impending Threat and the Best Defense. APRIL 2006.
8Karlof C, Shankar U, Tygar JD, Wagner D. Dynamic pharming attacks and the locked same-origin policies for web browsers. Proc. of the 14th ACM Conference on Computer and Communications Security (CCS 2007), November 2007.