Research on Security Technology based on WEB Application

Fanxing Kong

Abstract

This article described the relevant technologies of web security, thoroughly analyzed the application security of Web in three aspects of security threats of Web client, security threats of Web server, security threats of data transmission, and accordingly studied the security technology based on WEB application. Hope the elaboration of this article could provide some reference to the relevant personnel in the field.

References

  1. Xiaojie X, Yang X, Shuo J., Research and Design of Web Application Firewall Based on Feature Matching. Netinfo security, (11)53-59,2015
  2. Ziqian W, Bo W., Research on technology taking use of vulnerability of information security in Web application system. Electronic Product Reliability and Environmental Testing, (6):30-33, 2015
  3. Dongjiao Z, Ping W., Analysis on the security technology of Java Web application program. Computer fan, (3):48-49,2016
  4. Juan D, Yang X, Yuwei M., Research and design of audit system of security log based on Web application. Netinfo security, (10):70-76,2014
  5. Yi S, Dongyun L, Wenjie W., Research on the key technology of security testing platform of Web application program. Information Security and Technology, (1):29-32, 2014,
  6. Wang X.,Desing of Secure Identity Authentication System Based on JAAS in the Web Application System. Journal of Beijing University of Civl Engineering and Architecture, 24(2):55-59,2008
  7. Yubei Y., Application security of PGP encryption technology based on WEB in mail system, Network Security Technology & Application,(6):38-40,2015
  8. Chuan L., Research on Application of Web J2EE system identity authentication security mechanism based on Unix authentication. Journal of Chongqing University of Arts and Sciences,(4):65-67,2010
  9. Chengyu H. Research on the protection method of Web Java application software, Software Guide,(11):57- 58,2011
  10. Yongxiang W, On WEB website security optimization. Network Security Technology & Application,(5):136- 1137,2014
  11. Linhai Y, Binying H., Research on the content of Web code security artificial audit, Jiangxi Science,(4):536- 538,2014
  12. Hung-Bin C, Izhak Rubin,Ofer Hadar., Scalable Video Multicast for Multi-Cell Cellular Wireless Networks. Journal of Communications, 10(9):715-727, 2015
Download


Paper Citation


in Harvard Style

Kong F. (2016). Research on Security Technology based on WEB Application . In ISME 2016 - Information Science and Management Engineering IV - Volume 1: ISME, ISBN 978-989-758-208-0, pages 367-370. DOI: 10.5220/0006450603670370


in Bibtex Style

@conference{isme16,
author={Fanxing Kong},
title={Research on Security Technology based on WEB Application},
booktitle={ISME 2016 - Information Science and Management Engineering IV - Volume 1: ISME,},
year={2016},
pages={367-370},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006450603670370},
isbn={978-989-758-208-0},
}


in EndNote Style

TY - CONF
JO - ISME 2016 - Information Science and Management Engineering IV - Volume 1: ISME,
TI - Research on Security Technology based on WEB Application
SN - 978-989-758-208-0
AU - Kong F.
PY - 2016
SP - 367
EP - 370
DO - 10.5220/0006450603670370