期刊文献+
共找到1,558篇文章
< 1 2 78 >
每页显示 20 50 100
基于SOAP协议的Web Service安全基础规范(WS-Security) 被引量:30
1
作者 石伟鹏 杨小虎 《计算机应用研究》 CSCD 北大核心 2003年第2期100-102,105,共4页
讨论了WebService现有安全解决方案存在的问题,阐述了WS Security规范的内容和架构,以及对此的解决方法;随后给出了一个在WS Security框架内进行安全信息交换的实例;最后,介绍了WS Secu rity现有的实现以及未来的发展方向。
关键词 SOAP webSERVICE 计算机网络 网络安全 安全信息交换 安全基础规范
在线阅读 下载PDF
基于WS-Security规范的安全Web服务性能评估 被引量:1
2
作者 段友祥 包永堂 《小型微型计算机系统》 CSCD 北大核心 2009年第12期2364-2368,共5页
为了评估使用WS-Security规范进行安全处理后的Web服务性能,在研究分析Web服务架构及WS-Security规范的基础上,建立一个改进的时间响应评估模型.采用真实的测试环境,针对Web服务的时间性能和消息大小进行了实验,得出WS-Security安全规范... 为了评估使用WS-Security规范进行安全处理后的Web服务性能,在研究分析Web服务架构及WS-Security规范的基础上,建立一个改进的时间响应评估模型.采用真实的测试环境,针对Web服务的时间性能和消息大小进行了实验,得出WS-Security安全规范对Web服务响应时间和空间性能的影响,从而为Web服务在安全和性能两方面如何选择提供真实依据,对Web服务安全研究具有重要意义. 展开更多
关键词 WS—security web服务 性能评估 时间响应模型
在线阅读 下载PDF
基于WS-Security安全规范的Web服务设计 被引量:4
3
作者 张维勇 程俊 王建新 《合肥工业大学学报(自然科学版)》 CAS CSCD 北大核心 2006年第8期972-975,共4页
针对Web服务所面临的新的安全性挑战和威胁,文章分析了WS-Security规范、工作原理以及Web服务事务的安全性,构建了一个使用WSE配合数据库验证用户名/密码来获取Web服务的实例,解决了以往安全性处理不够灵活,需要将请求者和服务者捆绑在... 针对Web服务所面临的新的安全性挑战和威胁,文章分析了WS-Security规范、工作原理以及Web服务事务的安全性,构建了一个使用WSE配合数据库验证用户名/密码来获取Web服务的实例,解决了以往安全性处理不够灵活,需要将请求者和服务者捆绑在一起的问题,以提高Web服务应用层的安全性。 展开更多
关键词 web服务 WS-security规范 安全令牌
在线阅读 下载PDF
基于Spring Security安全的Web应用开发 被引量:9
4
作者 肖云 《计算机与现代化》 2011年第6期158-159,共2页
Web安全一直是应用开发中非常重要的方面。从安全性来说,需要考虑用户认证和授权。为Web应用增加安全性并不容易,需要考虑不同的认证和授权机制。Spring Security为使用Spring框架的Web应用提供了良好的支持。
关键词 SPRING SPRING security web MAVEN
在线阅读 下载PDF
基于WS-Security的Web Service模型的安全性实现 被引量:5
5
作者 孙延鹏 吾守尔.斯拉木 傅蓉 《计算机应用与软件》 CSCD 北大核心 2005年第5期30-32,143,共4页
本文通过研究WebService现有安全解决方案存在的问题,依据WSSecurity规范的内容和框架,对现存模型的安全性提出了改进,并给出了一个能够进行安全信息交换的具体实现,最后介绍了WebService安全模型的未来发展方向。
关键词 WS-security web 安全性 SERVICE e模型 安全解决方案 信息交换 发展方向 安全模型
在线阅读 下载PDF
基于WS-Security的Web空间信息服务安全体系 被引量:1
6
作者 李慧 王伟 李岩 《现代计算机》 2007年第3期39-43,共5页
随着Web空间信息服务的迅速发展,其安全性越来越受到重视,但现在大多数Web GIS安全策略存在不足。基于Web Services架构中引入WS-Security安全机制,提出一种空间信息的安全共享方案,用来弥补现有安全策略不足,并且已在.NET环境下实现。
关键词 web SERVICES WS—security XML加密 签名
在线阅读 下载PDF
基于WS-Security的Web服务安全的实现 被引量:5
7
作者 李瑞 陶明 《计算机与现代化》 2008年第12期131-133,137,共4页
Web服务应用越来越广泛,Web服务中的安全缺陷与漏洞也在不断增多,Web服务安全性问题日益突出。现有的保护Web服务的安全技术存在一些缺点和不足,而WS-Security规范的出现弥补了这些缺陷。本文在此基础上先对WS-Security规范进行了阐述,... Web服务应用越来越广泛,Web服务中的安全缺陷与漏洞也在不断增多,Web服务安全性问题日益突出。现有的保护Web服务的安全技术存在一些缺点和不足,而WS-Security规范的出现弥补了这些缺陷。本文在此基础上先对WS-Security规范进行了阐述,然后以.NET Framework 3.0为平台,利用该框架新增的组件Windows通信基础,给出了一个具体的Web服务安全的实现方法。 展开更多
关键词 web服务 安全 WS-security
在线阅读 下载PDF
基于WS-Security框架的Web服务安全解决方案 被引量:2
8
作者 杨海斌 《电脑编程技巧与维护》 2009年第18期102-103,109,共3页
Web服务为分布式异构系统的集成提供了很好的支持,但是它在安全性方面存在的问题却使得它的应用受到限制。本文介绍了WS-Security安全框架的构成,探讨了WS-Security框架在Web服务安全性中的应用,以XFire为背景,提出了完整的Web服务安全... Web服务为分布式异构系统的集成提供了很好的支持,但是它在安全性方面存在的问题却使得它的应用受到限制。本文介绍了WS-Security安全框架的构成,探讨了WS-Security框架在Web服务安全性中的应用,以XFire为背景,提出了完整的Web服务安全解决方案。 展开更多
关键词 WS—security web服务 XFIRE SOAP
在线阅读 下载PDF
Security integrated framework for semantic web based on social intelligence
9
作者 孟庆华 丁永生 《Journal of Southeast University(English Edition)》 EI CAS 2006年第3期409-412,共4页
An integrated security framework for a semantic web is proposed based on the social intelligence of an individual's avoiding harm and preserving transaction logic-integrity. The framework extends the semantic web mod... An integrated security framework for a semantic web is proposed based on the social intelligence of an individual's avoiding harm and preserving transaction logic-integrity. The framework extends the semantic web model and controls the dynamic security of semantic web services, such as trust, logic and reasoning. It includes four layers, that is, a trust entrance layer, a social intelligence layer, a transaction layer, and a TCP/IP security protocols layer. The trust entrance layer deals with trustable features from users. Social intelligence layer is responsible for logical questions for a semantic web. The transaction layer carries out transaction reasoning. And the TCP/IP security protocols layer ensures security communication. These layers can cooperate to build closed-security-ring with different security grades. The integrated security framework provides an integrated security method for semantic web flow so that it is universal for various semantic web technologies. 展开更多
关键词 integrated security framework social intelligence closed-security-ring security-channel semantic web
在线阅读 下载PDF
基于前后端联合分析的Java Web漏洞挖掘方法
10
作者 邹福泰 姜开达 +2 位作者 占天越 施纬 张亮 《计算机研究与发展》 北大核心 2026年第1期214-226,共13页
精准高效地挖掘Web应用当中存在的安全漏洞具有极高的研究价值。Web漏洞挖掘相关研究大多是针对PHP应用的,无法直接应用于Java Web漏洞挖掘。且现有的Web漏洞挖掘方法难以适应批量高效的需求,即难以在保持静态代码分析的性能下取得动态... 精准高效地挖掘Web应用当中存在的安全漏洞具有极高的研究价值。Web漏洞挖掘相关研究大多是针对PHP应用的,无法直接应用于Java Web漏洞挖掘。且现有的Web漏洞挖掘方法难以适应批量高效的需求,即难以在保持静态代码分析的性能下取得动态分析的精确度。为解决上述问题,提出了一种前后端联合分析的Web漏洞挖掘方法,利用前端解析提取污点源信息来帮助后端分析进行剪枝,提高漏洞覆盖率和检测性能;同时在漏洞挖掘时利用程序的动静态信息进行代码建模,结合数据流分析、污点分析、符号执行以及轻量动态求解技术完成漏洞的挖掘和验证,在引入较少开销前提下带来较大的效果提升。选取了CVE(common vulnerabilities and exposure)漏洞、开源CMS(content management system)以及开源社区应用中共105个Java Web漏洞对所提出的方法进行了实验,证明了各模块具有较好的分析效果,整体具有较强的漏洞挖掘能力。 展开更多
关键词 web安全 JAVA 漏洞挖掘 污点分析 符号执行
在线阅读 下载PDF
Benchmarking Approach to Compare Web Applications Static Analysis Tools Detecting OWASP Top Ten Security Vulnerabilities 被引量:6
11
作者 Juan R.Bermejo Higuera Javier Bermejo Higuera +2 位作者 Juan A.Sicilia Montalvo Javier Cubo Villalba Juan JoséNombela Pérez 《Computers, Materials & Continua》 SCIE EI 2020年第9期1555-1577,共23页
To detect security vulnerabilities in a web application,the security analyst must choose the best performance Security Analysis Static Tool(SAST)in terms of discovering the greatest number of security vulnerabilities ... To detect security vulnerabilities in a web application,the security analyst must choose the best performance Security Analysis Static Tool(SAST)in terms of discovering the greatest number of security vulnerabilities as possible.To compare static analysis tools for web applications,an adapted benchmark to the vulnerability categories included in the known standard Open Web Application Security Project(OWASP)Top Ten project is required.The information of the security effectiveness of a commercial static analysis tool is not usually a publicly accessible research and the state of the art on static security tool analyzers shows that the different design and implementation of those tools has different effectiveness rates in terms of security performance.Given the significant cost of commercial tools,this paper studies the performance of seven static tools using a new methodology proposal and a new benchmark designed for vulnerability categories included in the known standard OWASP Top Ten project.Thus,the practitioners will have more precise information to select the best tool using a benchmark adapted to the last versions of OWASP Top Ten project.The results of this work have been obtaining using widely acceptable metrics to classify them according to three different degree of web application criticality. 展开更多
关键词 web application benchmark security vulnerability security Analysis Static Tools assessment methodology false positive false negative precision F-MEASURE
在线阅读 下载PDF
Design and Implementation of Web Services Security Based on Message Layer 被引量:1
12
作者 WANGCui-ru XUZheng-wei YUANHe-jin MAHui-min 《Wuhan University Journal of Natural Sciences》 CAS 2004年第5期755-759,共5页
Along with the development of Internet, Web Services technology is a new branch of Web application program, and it has become a hotspot in computer science. However, it has not made great progress in research on Web S... Along with the development of Internet, Web Services technology is a new branch of Web application program, and it has become a hotspot in computer science. However, it has not made great progress in research on Web Services security. Traditional security solutions cannot satisfy the Web Services security require of selective protection, end-to-end security and application layer security. Web Services technology needs a solution integrated in Web Services framework to realize end-to-end security. Based on cryptography and Web Services technology and according to W3C, XML encryption specification, XML digital Signature specification and WS-Security, which proposed by IBM and Microsoft, a new Web services security model based on message layer is put forward in this paper. The message layer is composed of message handlers. It is inserted into the message processing sequence and provides transparent security services for Web Services. To verify the model, a Web Services security system is realized on, net platform. The implementation version of the model can provide various security services, and has advantages such as security, scalability, security controllability and end-to-end security in message level. Key words Web services - Web services security - message layer CLC number TP 393.08 Biography: WANG Cui-ru (1954-), female, Professor, research direction: database and information management system. 展开更多
关键词 web services web services security message layer
在线阅读 下载PDF
Systematic Review of Web Application Security Vulnerabilities Detection Methods 被引量:2
13
作者 Sajjad Rafique Mamoona Humayun +2 位作者 Zartasha Gul Ansar Abbas Hasan Javed 《Journal of Computer and Communications》 2015年第9期28-40,共13页
In recent years, web security has been viewed in the context of securing the web application layer from attacks by unauthorized users. The vulnerabilities existing in the web application layer have been attributed eit... In recent years, web security has been viewed in the context of securing the web application layer from attacks by unauthorized users. The vulnerabilities existing in the web application layer have been attributed either to using an inappropriate software development model to guide the development process, or the use of a software development model that does not consider security as a key factor. Therefore, this systematic literature review is conducted to investigate the various security vulnerabilities used to secure the web application layer, the security approaches or techniques used in the process, the stages in the software development in which the approaches or techniques are emphasized, and the tools and mechanisms used to detect vulnerabilities. The study extracted 519 publications from respectable scientific sources, i.e. the IEEE Computer Society, ACM Digital Library, Science Direct, Springer Link. After detailed review process, only 56 key primary studies were considered for this review based on defined inclusion and exclusion criteria. From the review, it appears that no one software is referred to as a standard or preferred software product for web application development. In our SLR, we have performed a deep analysis on web application security vulnerabilities detection methods which help us to identify the scope of SLR for comprehensively investigation in the future research. Further in this SLR considering OWASP Top 10 web application vulnerabilities discovered in 2012, we will attempt to categories the accessible vulnerabilities. OWASP is major source to construct and validate web security processes and standards. 展开更多
关键词 SOFTWARE Development LIFECYCLE web Applications security VULNERABILITIES Systematic LITERATURE REVIEW
在线阅读 下载PDF
The design and implementation of web mining in web sites security 被引量:2
14
作者 LI Jian, ZHANG Guo-yin , GU Guo-chang, LI Jian-li College of Computer Science and Technology, Harbin Engineering University, Harbin 150001China 《Journal of Marine Science and Application》 2003年第1期81-86,共6页
The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illeg... The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illegal access can be avoided. Firstly, the system for discovering the patterns of information leakages in CGI scripts from Web log data was proposed. Secondly, those patterns for system administrators to modify their codes and enhance their Web site security were provided. The following aspects were described: one is to combine web application log with web log to extract more information,so web data mining could be used to mine web log for discovering the information that firewall and Information Detection System cannot find. Another approach is to propose an operation module of web site to enhance Web site security. In cluster server session, Density -Based Clustering technique is used to reduce resource cost and obtain better efficiency. 展开更多
关键词 data mining web log mining web sites security density-based clustering
在线阅读 下载PDF
Review of Techniques for Integrating Security in Software Development Lifecycle
15
作者 Hassan Saeed Imran Shafi +3 位作者 Jamil Ahmad Adnan Ahmed Khan Tahir Khurshaid Imran Ashraf 《Computers, Materials & Continua》 SCIE EI 2025年第1期139-172,共34页
Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniq... Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniques coming up rapidly.The purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle(SDLC)by analyzing the articles published in the last two decades and to propose a way forward.This review follows Kitchenham’s review protocol.The review has been divided into three main stages including planning,execution,and analysis.From the selected 100 articles,it becomes evident that need of a collaborative approach is necessary for addressing critical software security risks(CSSRs)through effective risk management/estimation techniques.Quantifying risks using a numeric scale enables a comprehensive understanding of their severity,facilitating focused resource allocation and mitigation efforts.Through a comprehensive understanding of potential vulnerabilities and proactive mitigation efforts facilitated by protection poker,organizations can prioritize resources effectively to ensure the successful outcome of projects and initiatives in today’s dynamic threat landscape.The review reveals that threat analysis and security testing are needed to develop automated tools for the future.Accurate estimation of effort required to prioritize potential security risks is a big challenge in software security.The accuracy of effort estimation can be further improved by exploring new techniques,particularly those involving deep learning.It is also imperative to validate these effort estimation methods to ensure all potential security threats are addressed.Another challenge is selecting the right model for each specific security threat.To achieve a comprehensive evaluation,researchers should use well-known benchmark checklists. 展开更多
关键词 Software development lifecycle systematic literature review critical software security risks national institute of standards and technology DevSecOps open web application security project McGraw’s touch points
在线阅读 下载PDF
Hybrid Security Assessment Methodology for Web Applications 被引量:1
16
作者 Roddy A.Correa Juan Ramon Bermejo Higuera +3 位作者 Javier Bermejo Higuera Juan Antonio SiciliaMontalvo Manuel Sanchez Rubio A.Alberto Magrenan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第1期89-124,共36页
This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications.The analysis process is based on the use of techniques and tools that allow to perform security assessment... This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications.The analysis process is based on the use of techniques and tools that allow to perform security assessments of white box and black box,to carry out the security validation of a web application in an agile and precise way.The objective of the methodology is to take advantage of the synergies of semi-automatic static and dynamic security analysis tools and manual checks.Each one of the phases contemplated in the methodology is supported by security analysis tools of different degrees of coverage,so that the results generated in one phase are used as feed for the following phases in order to get an optimized global security analysis result.The methodology can be used as part of other more general methodologies that do not cover how to use static and dynamic analysis tools in the implementation and testing phases of a Secure Software Development Life Cycle(SSDLC).A practical application of the methodology to analyze the security of a real web application demonstrates its effectiveness by obtaining a better optimized vulnerability detection result against the true and false positive metrics.Dynamic analysis with manual checking is used to audit the results,24.6 per cent of security vulnerabilities reported by the static analysis has been checked and it allows to study which vulnerabilities can be directly exploited externally.This phase is very important because it permits that each reported vulnerability can be checked by a dynamic second tool to confirm whether a vulnerability is true or false positive and it allows to study which vulnerabilities can be directly exploited externally.Dynamic analysis finds six(6)additional critical vulnerabilities.Access control analysis finds other five(5)important vulnerabilities such as Insufficient Protected Passwords or Weak Password Policy and Excessive Authentication Attacks,two vulnerabilities that permit brute force attacks. 展开更多
关键词 web applications security vulnerability WEAKNESS security analysis white box black box interactive application security testing static application security testing dynamic application security testing
在线阅读 下载PDF
Hybrid Computational Modeling for Web Application Security Assessment 被引量:1
17
作者 Adil Hussain Seh Jehad F.Al-Amri +4 位作者 Ahmad F.Subahi Md Tarique Jamal Ansari Rajeev Kumar Mohammad Ubaidullah Bokhari Raees Ahmad Khan 《Computers, Materials & Continua》 SCIE EI 2022年第1期469-489,共21页
Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era.This has led to digital revolution,and in this context,the hardwired technologies in the so... Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era.This has led to digital revolution,and in this context,the hardwired technologies in the software industry play a significant role However,from the beginning,software security remains a serious issue for all levels of stakeholders.Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data,compromising the organizations’reputation that translates into,financial losses as well.Most of the data breaches are financially motivated,especially in the healthcare sector.The cyber invaders continuously penetrate the E-Health data because of the high cost of the data on the dark web.Therefore,security assessment of healthcare web-based applications demands immediate intervention mechanisms to weed out the threats of cyber-attacks.The aim of this work is to provide efficient and effective healthcare web application security assessment.The study has worked with the hybrid computational model of Multi-Criteria Decision Making(MCDM)based on Analytical Hierarchy Process(AHP)and Technique for Order of Preference by Similarity to Ideal-Solutions(TOPSIS)under the Hesitant Fuzzy(HF)environment.Hesitant fuzzy sets provide effective solutions to address decision making problems where experts counter hesitation to make a decision.The proposed research endeavor will support designers and developers in identifying,selecting and prioritizing the best security attributes for web applications’development.The empirical analysis concludes that Robustness got highest priority amongst the assessed security attributes set followed by Encryption,Authentication,Limit Access,Revoke Access,Data Validation,and Maintain Audit Trail.The results of this research endeavor depict that this proposed computational procedure would be the most conversant mechanism for determining the web application security.The study also establishes guidelines which the developers can refer for the identification and prioritization of security attributes to build more secure and trustworthy web-based applications. 展开更多
关键词 Healthcare web application security assessment hesitant fuzzy sets AHP-TOPSIS
在线阅读 下载PDF
Estimating Security Risk of Healthcare Web Applications: A Design Perspective 被引量:1
18
作者 Fahad A.Alzahrani 《Computers, Materials & Continua》 SCIE EI 2021年第4期187-209,共23页
In the recent years,the booming web-based applications have attracted the hackers’community.The security risk of the web-based hospital management system(WBHMS)has been increasing rapidly.In the given context,the mai... In the recent years,the booming web-based applications have attracted the hackers’community.The security risk of the web-based hospital management system(WBHMS)has been increasing rapidly.In the given context,the main goal of all security professionals and website developers is to maintain security divisions and improve on the user’s confidence and satisfaction.At this point,the different WBHMS tackle different types of security risks.In WBHMS,the security of the patients’medical information is of utmost importance.All in all,there is an inherent security risk of data and assets in the field of the medical industry as a whole.The objective of this study is to estimate the security risk assessment of WBHMS.The risks assessment pertains to securing the integrity of the information in alignment with the Health Insurance Portability and Accountability Act.This includes protecting the relevant financial records,as well as the identification,evaluation,and prevention of a data breach.In the past few years,according to the US-based cyber-security firm Fire-eye,6.8 million data thefts have been recorded in the healthcare sector in India.The breach barometer report mentions that in the year 2019,the data breaches found were up to 48.6%as compared to the year 2018.Therefore,it is very important to assess the security risk in WBHMS.In this research,we have followed the hybrid technique fuzzy analytic hierarchy process-technique for order of preference by similarity to ideal solution(F-AHPTOPSIS)approach to assess the security risk in WBHMS.The place of this empirical database is at the local hospital of Varanasi,U.P.,India.Given the affectability of WBHMS for its board framework,this work has used diverse types of web applications.The outcomes obtained and the procedure used in this assessment would support future researchers and specialists in organizing web applications through advanced support of safety and security. 展开更多
关键词 web based hospital management system security risk fuzzy AHP fuzzy TOPSIS
在线阅读 下载PDF
SOAP-Based Security Interaction of Web Service inHeterogeneous Platforms 被引量:1
19
作者 Tao Xu Chunxiao Yi 《Journal of Information Security》 2011年第1期1-7,共7页
With the development and application of SOA technology, security issues of Web services based on heterogeneous platform have become increasingly prominent. The security of SOAP message is of great importance to Web se... With the development and application of SOA technology, security issues of Web services based on heterogeneous platform have become increasingly prominent. The security of SOAP message is of great importance to Web service security. In order to solve the security issue of heterogeneous platforms, a security processing model named SIMSA (Security Interactive Model based on SOAP and Authentication) based on SOAP and authentication is proposed in this paper. By experimental verification, the model ensures the safety of SOAP message transmission and enhances the security of Web service in heterogeneous platforms. 展开更多
关键词 SOAP HETEROGENEOUS web SERVICE SIMSA security Interaction
在线阅读 下载PDF
基于Nginx+Modsecurity实现Web应用防护系统 被引量:2
20
作者 方楚鑫 《信息与电脑》 2018年第12期111-113,共3页
Nginx是性能强大的轻量级Web应用服务器,它使用C语言实现,代码精简高效,为微内核架构,拥有超强的健壮性和可拓展性。使用反向代理方式部署Nginx服务器,可以直接阻止用户对内部业务服务器的网络攻击。Modsecurity是Nginx的一个扩展模块,... Nginx是性能强大的轻量级Web应用服务器,它使用C语言实现,代码精简高效,为微内核架构,拥有超强的健壮性和可拓展性。使用反向代理方式部署Nginx服务器,可以直接阻止用户对内部业务服务器的网络攻击。Modsecurity是Nginx的一个扩展模块,能对用户Web请求进行安全性评估和有效阻断,形成一个高性能的Web应用防护体系,达到硬件Web应用防火墙(WAF)的效果。 展开更多
关键词 NGINX Modesecurity 网络安全 web应用防护系统
在线阅读 下载PDF
上一页 1 2 78 下一页 到第
使用帮助 返回顶部