期刊文献+

AJAX技术下隐蔽通道的安全设计 被引量:2

Security design of covert channel based on AJAX technology
在线阅读 下载PDF
导出
摘要 通过Internet,在使用AJAX方式下载文件的代码中调整存储路径,会导致在文件下载进程中,存在隐蔽存储通道的问题,隐蔽通道的存在会给信息安全带来隐患。为提高下载信息的安全性和可靠性,通过分析隐蔽通道处理技术,对隐蔽通道的存在进行改进,并设计了一种安全模型,对下载的数据信息进行隐蔽存储通道的消除和过滤,通过MD5值验证下载信息的完整,为网络下载中确保信息数据的安全性和可信性提供保障。 During the process of using Asynchronous Java Script and XML(AJAX) technology to download files on internet,adjusting the storage path will result in the existence of covert channel,which will threaten the information security.This study designed a kind of security model through analyzing the treatment technology on covert channel.By starting the filtering function of the security model and Md5Checker,the validity and authenticity of information in the download process can be ensured.
出处 《信息与电子工程》 2011年第5期665-667,共3页 information and electronic engineering
关键词 安全设计 AJAX技术 隐蔽通道 security design AJAX technology covert channel
  • 相关文献

参考文献7

二级参考文献44

  • 1刘海燕,杨洪路.基于网络的安全漏洞探测技术[J].装甲兵工程学院学报,2003,17(1):67-70. 被引量:7
  • 2[1]Tidwell T Larson, R Fitch K, Hale J. Modeling Intemet Attacks[M]. ISBN 0-7803-9814-9, June 2001.
  • 3[2]Scambray Joel, McClure Stuart, Kurtz George. Hacking Exposed: Network Security Secrets & Solutions (Second Edition)[M].Berkley: McGraw Hill, 2001.
  • 4[3]Schumacher Markus, Roedig Utz. Security Engineering with Pattems[DB/OL]. http://jerry. cs.uiuc.edu/~plop/plop2001/accepted_submissions/PLoP2001/mschumacher0/PLoP200 1_mschumacher0_ 1 .pdf,2001-07-27.
  • 5[4]Moore Andrew, Ellison Robert, Linger Richard. Attack Modeling for Informational Security and Survivability[DB/OL]. CMU/SEI -2001-TN-001. http://www. cert.org/archive/pdf/01tn001.pdf, 2001-03.
  • 6[5]Schneier B. Attack Trees[J]. Dr. Dobb's Journal of Software Tools 24, 1999,(12):21-29.
  • 7[6]Moberg Fredrick. Security of an Information System using an attack tree methodology[DB/OL]. http://www. ce.chalmers.se/staff /jonsson/fredrik.moberg-thesis.pdf, 2000-11-16
  • 8[7]Steffan Jan, Schumacher Markus. Collaborative Attack Modeling[Z]. ACM 1-58113-445-02/02/03, 2 February 2002.
  • 9[8]Schudel Gregg, Wood Bradley. Modeling Behavior of the Cyber Terrorist[A] (submitted to) 2000 National Information Systems Security Conference, Baltimore MD, October 2000.
  • 10[5]Heather Osterloh.TCP/IP Primer Plus(中文版) [M].张金祥,译.北京:人民邮电出版社,2002.

共引文献42

同被引文献16

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部