版权说明 操作指南
首页 > 成果 > 详情

Study on Security of Web-based Database

认领
导出
Link by DOI
反馈
分享
QQ微信 微博
成果类型:
期刊论文、会议论文
作者:
Zhao, Qing*;Qin, Shihong
通讯作者:
Zhao, Qing
作者机构:
[Zhao, Qing; Qin, Shihong] Wuhan Polytech Univ, Elect & Informat Engn Dept, Wuhan 430023, Peoples R China.
通讯机构:
[Zhao, Qing] W
Wuhan Polytech Univ, Elect & Informat Engn Dept, Wuhan 430023, Peoples R China.
语种:
英文
期刊:
PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS
年:
2008
卷:
2
页码:
1853-1856
会议名称:
Pacific/Asia Workshop on Computational Intelligence and Industrial Application
会议时间:
DEC 19-20, 2008
会议地点:
Wuhan, PEOPLES R CHINA
会议主办单位:
[Zhao, Qing;Qin, Shihong] Wuhan Polytech Univ, Elect & Informat Engn Dept, Wuhan 430023, Peoples R China.
会议赞助商:
IEEE, IEEE IES Ind Elect Soc, Wuhan Inst Technol, Huazhong Univ Sci & Technol, Huazhong Normal Univ, Comp & Security Ctr
主编:
Zhang, Y Tan, H Luo, Q
出版地:
10662 LOS VAQUEROS CIRCLE, PO BOX 3014, LOS ALAMITOS, CA 90720-1264 USA
出版者:
IEEE COMPUTER SOC
ISBN:
978-1-4244-4204-1
机构署名:
本校为第一且通讯机构
院系归属:
电气与电子工程学院
摘要:
Web database is a combined production with database technology and Web technology, it stores and manages a great deal of data, if they are embezzled or juggled, which maybe bring enormous political and economic losses to the society. So it is imperative to properly establish security for Web database against illegitimate intrusion. The host identity protocol (HIP) is designed by the Internet Engineering Task Force (IETF), it introduces a separation between the host identity and location identity, and is used to authenticate the host identity of an end system and to set up a limited relationshi...

反馈

验证码:
看不清楚,换一个
确定
取消

成果认领

标题:
用户 作者 通讯作者
请选择
请选择
确定
取消

提示

该栏目需要登录且有访问权限才可以访问

如果您有访问权限,请直接 登录访问

如果您没有访问权限,请联系管理员申请开通

管理员联系邮箱:yun@hnwdkj.com