Security Design and Implementation of Yangtze Gold Cruises Website

被引:0
|
作者
Tan, Huashan [1 ]
Yang, You [1 ]
Yu, Ping [1 ]
机构
[1] Chongqing Normal Univ, Sch Comp & Informat Sci, Chongqing 400047, Peoples R China
关键词
Yangtze gold cruises; web security; SQL injection attack; substitute algorithm;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Based on the analysis of common web security defects, some web design considerations about web data security and user identity authentication were pointed out. A substitute algorithm and its program used in web data were described. SQL injection attack (SIA) to web data couldn't operate due to the using of this algorithm. Values generated by MD5 algorithm was added to username and password, for the goal to ensure the user table storing security. To resist SIA while identity was authenticating, a method called program authentication was proposed. These safety measures or considerations may benefit to similar web design.
引用
收藏
页码:477 / 483
页数:7
相关论文
共 50 条
  • [31] Design and Implementation of Ontology-Based Search Algorithm for Internal Website
    Tao, Wenyuan
    Zhang, Haitao
    Lu, Wenhuan
    Wang, Shengbei
    KNOWLEDGE ENGINEERING AND MANAGEMENT, 2011, 123 : 297 - 302
  • [32] Design and Implementation of a Security Manager for WirelessHART Networks
    Raza, Shahid
    Voigt, Thiemo
    Slabbert, Adriaan
    Landernas, Krister
    2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 199 - 208
  • [33] Design and implementation of security enhanced system for oracle
    School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing 100044, China
    Beijing Youdian Daxue Xuebao, 2006, 5 (84-87):
  • [34] An IDE for the Design, Verification and Implementation of Security Protocols
    Garcia, Remi
    Modesti, Paolo
    2017 IEEE 28TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW 2017), 2017, : 157 - 163
  • [35] Design and implementation of an enhanced security layer for bluetooth
    Hämäläinen, P
    Liu, N
    Sterling, R
    Hännikäinen, M
    Hämäläinen, TD
    CONTEL 2005: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS, VOLS 1 AND 2, 2005, : 575 - 582
  • [36] The design and implementation of a novel security model for HealthAgents
    Xiao, Liang
    Dasmahapatra, Srinandan
    Lewis, Paul
    Hu, Bo
    Peet, Andrew
    Gibb, Alex
    Dupplaw, David
    Croitoru, Madalina
    Estanyol, Francesc
    Martinez-Miranda, Juan
    Gonzalez-Velez, Horacio
    Ariet, Magilluch I.
    KNOWLEDGE ENGINEERING REVIEW, 2011, 26 (03): : 261 - 282
  • [37] Design and Implementation of A RFID Security Authentication Protocol
    Zhang, Lei
    Xiao, Zicong
    2013 2ND INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION AND MEASUREMENT, SENSOR NETWORK AND AUTOMATION (IMSNA), 2013, : 102 - 105
  • [38] Design and implementation of XML data security system
    Lin, Xuelian
    Liu, Xudong
    Huai, Jinpeng
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2003, 29 (04): : 362 - 365
  • [39] Design and Implementation of AES Data Security Protocol
    Bhoyar, Dinesh B.
    Kaur, Indersheel
    Mohod, Swati K.
    Kulat, K. D.
    BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (14): : 495 - 497
  • [40] Design and implementation of national security vulnerability database
    Zhang, Yu-Qing
    Wu, Shu-Ping
    Liu, Qi-Xu
    Liang, Fang-Fang
    Tongxin Xuebao/Journal on Communications, 2011, 32 (06): : 93 - 100