Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Information and Electronic Engineering》 2010-03
Add to Favorite Get Latest Update

Part access technology of Web based on script and pass parameters of URL

LI Lan-ying1,LI Xiao-yun2 (1.Xinjin Sub-University,Civil Aviation Flight University,Chengdu Sichuan 611431,China;2.780456 Troops of PLA,Chengdu Sichuan 610011,China)  
Access control technology is necessary for information security and open Web service.Main access control technology considers the system as a whole and provides the technical platform to implement access control policy.In the view of information security and economic benefit,this article presents part access control technologies according to different demands of Web.Based on the platform of whole access control technology,according to the process of Web browsing,part access control of Web information resource can be realized through script Microsoft Active Server Pages(ASP) access and the pass parameters of Uniform Resource Locator(URL) expressing the attributes of location in database.It can resolve security problems of Web access at a low cost.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 4 Hits
1 LUO Ling BAI Xiao-Ying (Department of Computer Science and Technology, Tsinghua University, Beijing 100084);A Survey of Web Services Technology[J];Computer Science;2004-04
2 WANG Jian-jun~(1,2),NING Hong~2,PENG Daiwen~2(1.Dept.of Information Science & Technology,Hunan First Normal College,Changsha Hunan 410002,China;2.School of Computer Science,National University of Defense Technology,Changsha Hunan 410073,China);Research of Security Mechanism Based on Policy of Mixed Access Control[J];Application Research of Computers;2006-03
3 LIN Chuang1+, FENG Fu-Jun1,2, LI Jun-Shan2 1(Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China) 2(Department of Computer Science, The Second Artillery Engineering College, Xi’an 710025, China);Access Control in New Network Environment[J];Journal of Software;2007-04
4 XIONG Zhi,LIU Jia-yong,REN Wei (Institute of Information Security,Sichuan University,Chengdu Sichuan 610064,China);Realization of role context-based mandatory access control[J];Information and Electronic Engineering;2009-06
Chinese Journal Full-text Database 10 Hits
1 LU Rong-jie, LIU Zhi-gui, HUANG Xiao-fang (College of Computer Science, Southwest University of Science & technology, Mianyang 621002, China);J2EE Security Authentication of Web Client-Side Based on Container Management[J];Ordnance Industry Automation;2005-03
2 MA Bin1,2,XIE Xian-zhong1,2(1.College of Computer Science and Technology,Chongqing University of Posts and Telecommunications,Chongqing 400065,P.R.China;2.Institute of Personal Communication,Chongqing University of Posts and Telecommunications,Chongqing 400065,P.R.China);A novel intelligent risk based access control planning[J];Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition);2009-04
3 LIN Jia-yuan,FANG Yu,CHEN Bin(Institute of Remote Sensing and GIS,Peking University,Beijing 100871,China);Study on Access Control for Spatial Data[J];Geography and Geo-Information Science;2008-02
4 ZHU Liu-zhang(Anhui Electric Power JIYUAN Software Corp.Ltd.,Hefei 230088,China);SAML SSO of electric integrated application platform[J];Telecommunications for Electric Power System;2007-10
5 ZHANG He-gao1,XIONG Wen-can2,LI Xiang1 (1. Institute of Computer Science ,Guizhou University ,Guiyang ,Guizhou 550025,China; 2.The Science and Technology Office,the Police Office of Guizhou Province, Guiyan,Guizhou 550005,China);The design and implementation of identity validation and encrypted transfer protocol based on Web Service[J];Computer and Information Technology;2005-05
6 LUO Zhen-yi, LIU Dong-yuan(Department of Computer Center,Shaoguan University,Shaoguan 512005,China);Again Searches Analyzes the Website Safe Programs[J];Computer Knowledge and Technology;2006-14
7 BIAN Yi-ming,YANG Geng(College of Computer,Nanjing University of Posts and Telecommunications,Nanjing Jiangsu 210003,China);Research on Access Control Method Based on ABE Algorithm[J];Guangxi Communication Technology;2009-04
8 ZHU Hai-ying,LIU Gai(School of Information Technolgy,Changchun Vocational Institute of Technology,Changchun 130033,China);Design and implementation of network exam system with speech navigation for the blind in inclusive education[J];Journal of Changchun University;2010-02
9 He Guiying (CCCC Forth Engineering Co.,Ltd Third Brand,Zhanjiang 524009,Guangdong);Security Risks and Solutions in Document Informatization[J];Computer & Telecommunication;2010-05
10 LI Fan~1,YE Yan~2(1.School of Compter Science and Technology,Wuhan University of Technology,Wuhan 430007,China;2.School of Information Engineering,Hubei Insititute for Nationalities,Enshi 445000,China);Analysis and Implementation of Web Services Application-layer Encryption Based on .NET[J];Journal of Hubei Institute for Nationalities(Natural Science Edition);2006-01
China Proceedings of conference Full-text Database 1 Hits
1 ;Research on Recommendation System Based on Web Service in Technology Transfer Platform[A];[C];2005
【Secondary Citations】
Chinese Journal Full-text Database 6 Hits
1 CUI Binge,LIU Daxin(School of Computer Science and Technology,Harbin Engineering University,Harbin 150001);Realization of Mandatory Access Control in Role-based Protection Systems[J];Computer Engineering;2006-06
2 LIANG Bin SUN Yu-Fang SHI Wen-Chang SUN Bo (Institute of Software, Chinese Academy of Sciences, Beijing 100080) (State Key Laboratory of Information Security, Beijing 100080);An Improved Method to Enforce BLP Model and Its Variations in Role-Based Access Control[J];Chinese Journal of Computers;2004-05
3 LIN Chuang PENG Xue-Hai (Department of Computer Science and Technology, Tsinghua University, Beijing 100084);Research on Trustworthy Networks[J];Chinese Journal of Computers;2005-05
4 WANG Jian-jun~1,NING Hong~2,CHEN Huai-yi~2 (1.Dept.of Information Technology,First Teachers School of Hunan,Changsha Hunan 410002,China;2.School of Computer Science,National University of Defense Technology,Changsha Hunan 410073,China);Research and Analysis of Mixed Using about Two Models[J];Application Research of Computers;2004-11
5 ZHANG Ye,FANG Yong,LV Wei,SHI Xi-lin,DENG Yuan-lin(College of Electronics and Information Engineering,Sichuan University,Chengdu Sichuan 610064,China);Permission Model of Object Group-based RBAC[J];Information and Electronic Engineering;2007-02
6 LIU Wei,LIU Jia-yong(Institute of Information Security,Sichuan University,Chengdu Sichuan 610064,China);An Extended Role-Based Access Control Model and Method[J];Information and Electronic Engineering;2009-01
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved