Security Design and Implementation of Yangtze Gold Cruises Website

被引:0
|
作者
Tan, Huashan [1 ]
Yang, You [1 ]
Yu, Ping [1 ]
机构
[1] Chongqing Normal Univ, Sch Comp & Informat Sci, Chongqing 400047, Peoples R China
关键词
Yangtze gold cruises; web security; SQL injection attack; substitute algorithm;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Based on the analysis of common web security defects, some web design considerations about web data security and user identity authentication were pointed out. A substitute algorithm and its program used in web data were described. SQL injection attack (SIA) to web data couldn't operate due to the using of this algorithm. Values generated by MD5 algorithm was added to username and password, for the goal to ensure the user table storing security. To resist SIA while identity was authenticating, a method called program authentication was proposed. These safety measures or considerations may benefit to similar web design.
引用
收藏
页码:477 / 483
页数:7
相关论文
共 50 条
  • [41] Design and implementation of a security label common framework
    Liang, Hong-Liang
    Sun, Yu-Fang
    Zhao, Qing-Song
    Zhang, Xiang-Feng
    Sun, Bo
    Ruan Jian Xue Bao/Journal of Software, 2003, 14 (03): : 547 - 552
  • [42] Design and implementation of data center network security
    Du, Wei
    MANUFACTURING PROCESS AND EQUIPMENT, PTS 1-4, 2013, 694-697 : 2308 - 2312
  • [43] Design and Implementation of Security System for Smart Home
    Raja, M. Akhil
    Reddy, G. Rakesh
    Ajitha
    2017 INTERNATIONAL CONFERENCE ON ALGORITHMS, METHODOLOGY, MODELS AND APPLICATIONS IN EMERGING TECHNOLOGIES (ICAMMAET), 2017,
  • [44] Design and Implementation of Security Cloud Storage Framework
    Yang Wei
    Zhao Jianpeng
    Zhu Junmao
    Zhong Wei
    Yao Xinlei
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 323 - 326
  • [45] New design strategy of dynamic security implementation
    Soliman, HS
    Omari, M
    GLOBECOM 2004: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE WORKSHOPS, 2004, : 442 - 446
  • [46] Design and implementation of security vulnerabilities scanner system
    Dai, Zufeng
    Zhang, Yuqing
    Hu, Yupu
    Hong, Hong
    Xie, Chongbin
    Jisuanji Gongcheng/Computer Engineering, 2004, 30 (09):
  • [47] Design and. VLSI implementation of a security ASIP
    Lu, Ronghua
    Zeng, Xiaoyang
    Han, Jun
    Gu, Yehua
    Mai, Lang
    ASICON 2007: 2007 7TH INTERNATIONAL CONFERENCE ON ASIC, VOLS 1 AND 2, PROCEEDINGS, 2007, : 866 - 869
  • [48] Scalable security processor design and its implementation
    Wang, Chen-Hsing
    Yeh, Jen-Chieh
    Huang, Chih-Tsun
    Wu, Cheng-Wen
    2005 IEEE ASIAN SOLID-STATE CIRCUITS CONFERENCE, PROCEEDINGS OF TECHNICAL PAPERS, 2005, : 513 - 516
  • [49] Design and Implementation of Security Enhanced Module in Database
    Wang, Peng
    Xing, Liu
    Gu, Xin
    Zhu, Changming
    2013 SEVENTH INTERNATIONAL CONFERENCE ON INTERNET COMPUTING FOR ENGINEERING AND SCIENCE (ICICSE 2013), 2013, : 60 - 62
  • [50] Design and Implementation of Security OS Based on TrustZone
    Luo Jing
    Jiang Chunhua
    Yan Xia
    PROCEEDINGS OF 2013 IEEE 11TH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS (ICEMI), 2013, : 1027 - 1032