Security Design and Implementation of Yangtze Gold Cruises Website

被引:0
|
作者
Tan, Huashan [1 ]
Yang, You [1 ]
Yu, Ping [1 ]
机构
[1] Chongqing Normal Univ, Sch Comp & Informat Sci, Chongqing 400047, Peoples R China
关键词
Yangtze gold cruises; web security; SQL injection attack; substitute algorithm;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Based on the analysis of common web security defects, some web design considerations about web data security and user identity authentication were pointed out. A substitute algorithm and its program used in web data were described. SQL injection attack (SIA) to web data couldn't operate due to the using of this algorithm. Values generated by MD5 algorithm was added to username and password, for the goal to ensure the user table storing security. To resist SIA while identity was authenticating, a method called program authentication was proposed. These safety measures or considerations may benefit to similar web design.
引用
收藏
页码:477 / 483
页数:7
相关论文
共 50 条
  • [21] Implementation on the website design using immersive virtual reality technology
    Lin, Hung-Lin
    Lin, Tsung-Yi
    Huang, Xing-Cheng
    Tsai, Jen-Hao
    Wang, Ming-Bo
    Chen, Sheng-Yun
    Hong, Qian-Hui
    PROCEEDINGS OF THE 2017 IEEE INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND ENGINEERING (IEEE-ICICE 2017), 2017, : 197 - 199
  • [22] The Design and Implementation of a Website Internal Search System Based on Sphinx
    Wang, Beizhan
    Deng, Xiang
    ADVANCES IN MANUFACTURING TECHNOLOGY, PTS 1-4, 2012, 220-223 : 2763 - 2767
  • [23] The State of Website Security
    Grossman, Jeremiah
    IEEE SECURITY & PRIVACY, 2012, 10 (04) : 91 - 93
  • [24] Design and Implementation of RVJCS Security model
    Vijaykumar, M. R.
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [25] Design and Implementation of a Computer Security Diploma
    Betarte, Gustavo
    Corti, Maria E.
    PROCEEDINGS OF THE 2013 XXXIX LATIN AMERICAN COMPUTING CONFERENCE (CLEI), 2013,
  • [26] SECURITY KERNEL DESIGN AND IMPLEMENTATION - AN INTRODUCTION
    AMES, SR
    GASSER, M
    SCHELL, RR
    COMPUTER, 1983, 16 (07) : 14 - 22
  • [27] Design and implementation of CORBA security service
    Zhou, XS
    Li, XD
    36TH INTERNATIONAL CONFERENCE ON TECHNOLOGY OF OBJECT-ORIENTED LANGUAGES AND SYSTEMS, PROCEEDINGS, 2000, : 140 - 145
  • [28] The design and implementation of MAC security in EPON
    Han, KS
    Kim, KO
    Yoo, TW
    Kwon, Y
    8th International Conference on Advanced Communication Technology, Vols 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U1673 - U1676
  • [29] Cross-cultural user perceptions of website design and security: A commentary
    Cyr, Dianne
    Electronic Commerce Research and Applications, 2016, 19 : 91 - 93