期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
基于JSP的社交网站设计
1
作者 胡涛 《电脑知识与技术》 2014年第5期3193-3194,共2页
由于有关网络的科技发展,用户对于网络有了越来越多的需求,这时和社交有关的网站就成了热点,本系统是从学习、交流、分享,还有大范围的社交需求中产生的,用到B/S(Browser/Server)结构,使获取数据在浏览器中显示,而处理却在服务... 由于有关网络的科技发展,用户对于网络有了越来越多的需求,这时和社交有关的网站就成了热点,本系统是从学习、交流、分享,还有大范围的社交需求中产生的,用到B/S(Browser/Server)结构,使获取数据在浏览器中显示,而处理却在服务器中运行,用户只要一个浏览器就够了。现今社交网站的界面设计非常漂亮,主要是因为用到了jquery、ext等流行的JavaScript框架。开发中选择了SSH三大框架,dao层+service层+action层+jsp显示层的mvc分层这样的开发模式,适用于简单的用户需求。 展开更多
关键词 社交网站 网络领域 javascript框架
下载PDF
CSRF protection in JavaScript frameworks and the security of JavaScript applications
2
作者 Ksenia Peguero Xiuzhen Cheng 《High-Confidence Computing》 2021年第2期7-13,共7页
With JavaScript being the most popular programming language on the web,several new JavaScript frameworks are released every year.A well designed framework may help developers create secure applications.The goal of our... With JavaScript being the most popular programming language on the web,several new JavaScript frameworks are released every year.A well designed framework may help developers create secure applications.The goal of our study is to understand how framework developers can best protect applications developed using their framework.In this work we studied how cross-site request forgery vulnerability is mitigated in several server-side JavaScript frameworks:Express.js,Koa.js,Hapi.js,Sails.js,and Meteor.js.We then analyzed open source applications developed with these frameworks using open source and custom written tools for automated static analysis and identified the percentage of protected applications for each framework.We correlated our analysis results to the implementation levels of mitigating controls in each framework and performed statistical analysis of our results to ensure no other confounding factors were involved.Based on the received outcomes we provide recommendations for framework developers on how to create frameworks that produce secure applications. 展开更多
关键词 javascript security Web security Web frameworks Framework analysis Cross-site request forgery
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部