首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
针对目前Java技术的广泛应用,特别是很多基于J2EE平台的电子商务系统的开发,文中介绍了Java2下的一种身份认证技术JAAS(Java Authentication Authorization Service).由于身份认证和授权与安全机制密切相关,同时也对Java的安全及权限访问控制做了一些阐述.  相似文献   

2.
动态口令技术是通过计算器得到随时变化的、不可预知的、一次性有效口令的技术。基于移动Java的动态身份认证系统,采用手机作为动态口令计算器,通过改进的动态口令认证协议,提供了高效、安全、方便的身份认证。  相似文献   

3.
针对当前B/S 模式下公共网络中进行身份认证的安全问题,设计了使用静态口令和动态口令结合进行一次一密身份认证的方案,它将认证服务器与应用程序服务器分离,使静态口令认证在安全通道内进行,有效保障口令的安全。动态口令认证采用著名的Schnorr 身份认证协议,其私钥采用复杂的混沌序列生成以确保密钥敏感安全性,结合Java Applet 技术对公共网络上传输的信息采用对称DES 算法加密,提升了整个系统的可靠性。研究方案最后通过实例验证了系统的可行性和安全保障性。  相似文献   

4.
Java智能卡的应用已日益广泛,由于其中涉及到了身份认证、移动通信和电子支付等敏感信息,所以必须为Java智能卡制定完善的安全机制。针对此问题,对Java智能卡的结构和各种安全机制进行了介绍和探讨,分析了Java智能卡的安全性。  相似文献   

5.
本文首先介绍了数字证书Java安全体系结构等概念,然后介绍了Java中对证书进行操作的类及其方法,最后论述了如何在实际应用中运用证书进行身份认证.  相似文献   

6.
基于MD5算法和Schnorr协议的双因素身份认证系统   总被引:12,自引:3,他引:9  
身份认证就是通过某种手段对用户所声称的身份进行认证的过程,它是实现系统安全的重要机制。将静态口令机制和动态口令机制结合起来,提出了一个双因素身份认证方案,静态口令用安全的散列函数MD5算法加密,动态口令基于著名的Schnorr协议生成。在此方案的基础上,使用Java语言实现了该身份认证系统。  相似文献   

7.
因特网的日益发展给人们提供了更多的机会和方便快捷,同时也带来了更多的安全隐患。Kerberos解决了这个问题。Kerberos是一种身份认证协议,提供了集中的身份验证服务器,提供了从服务器端验证用户、用户端验证服务器,以及用户和服务器之间加密报文传输的安全功能。文中研究了Kerberos身份认证协议,完成和分析了运用Kerberos协议实现身份认证和安全通信的客户机/服务器程序的Java实现。  相似文献   

8.
Java安全体系在Web程序中的研究和应用*   总被引:3,自引:0,他引:3  
提出了一种基于Java的Web程序安全解决方案。该方案采用JAAS(Java Authentication Authorization Service)实现可插入式登录模块,采用X509数字证书作为用户身份认证,通过配置Web服务器,并利用服务器证书和客户端证书实现服务器与客户端之间的SSL双向认证;待认证成功后,再利用服务器和客户端协商好的对称密钥来建立HTTPS连接,以实现数据的安全传送。该方案为基于Java的Web程序提供了一个安全接口,可以方便地移植。  相似文献   

9.
一种实现Web应用服务器安全的新方法   总被引:10,自引:1,他引:9  
Web应用系统中服务器一方的安全性主要通过用户身份认证和对应用逻辑的访问控制进行保证,但HTTP协议的无状态性,使得这些安全措施的实现变得比较困难。该文提出了一种基于Java的SessionTracking技术实现Web服务器安全的新方法,方法充分发挥了Java语言的技术特性,不但能够有效地解决Web应用服务器的安全问题,而且编程实现简单,此方法在WBMS系统中得到了成功的应用。  相似文献   

10.
基于JAAS技术的J2EE安全性应用与研究   总被引:3,自引:0,他引:3  
随着Java2平台的应用越来越广泛,尤其是J2EE在企业级系统和电子商务系统中的大量应用,相应地关于J2EE安全性的研究也就越来越广泛。首先从Java安全体系结构的研究人手,对基于JAAS的J2EE安全机制进行了分析和探讨,并详细介绍了身份认证模块的具体设计过程,以及该模块在智能大厦OA系统中的应用。  相似文献   

11.
《计算机科学》2007,34(4):148-148
Recent years have seen rapid advances in various grid-related technologies, middleware, and applications. The GCC conference has become one of the largest scientific events worldwide in grid and cooperative computing. The 6th international conference on grid and cooperative computing (GCC2007) Sponsored by China Computer Federation (CCF),Institute of Computing Technology, Chinese Academy of Sciences (ICT) and Xinjiang University ,and in Cooperation with IEEE Computer Soceity ,is to be held from August 16 to 18, 2007 in Urumchi, Xinjiang, China.  相似文献   

12.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

13.
本文分析了法律数据库的结构和特点,介绍了采用面向对象设计方法和超文本数据库技术开发和实现法律信息库系统将作为重要网络资源之一为不同用户进行法律咨询服务。  相似文献   

14.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

15.
16.
17.
正SCIENCE CHINA Information Sciences(Sci China Inf Sci),cosponsored by the Chinese Academy of Sciences and the National Natural Science Foundation of China,and published by Science China Press,is committed to publishing highquality,original results of both basic and applied research in all areas of information sciences,including computer science and technology;systems science,control science and engineering(published in Issues with odd numbers);information and communication engineering;electronic science and technology(published in Issues with even numbers).Sci China Inf Sci is published monthly in both print and electronic forms.It is indexed by Academic OneFile,Astrophysics Data System(ADS),CSA,Cabells,Current Contents/Engineering,Computing and Technology,DBLP,Digital Mathematics Registry,Earthquake Engineering Abstracts,Engineering Index,Engineered Materials Abstracts,Gale,Google,INSPEC,Journal Citation Reports/Science Edition,Mathematical Reviews,OCLC,ProQuest,SCOPUS,Science Citation Index Expanded,Summon by Serial Solutions,VINITI,Zentralblatt MATH.  相似文献   

18.
正Erratum to:J Zhejiang Univ-Sci C(ComputElectron)2014 15(7):551-563doi:10.1631/jzus.C1300320The original version of this article unfortunately contained mistakes.Algorithm 6 should be as follows:Algorithm 6 FGKFCM-F clustering Input:(1)X={x_1,x_2,…,x_N},,x_iR~d,i=1,2,…,N,the dataset;(2)C,1C≤N,the number of clusters;(3)ε0,the stopping criterion;  相似文献   

19.
20.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号