Skip to main content

The Analysis of the Safety Defects Based on ASP.NET

  • Conference paper
Innovative Computing and Information (ICCIC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 231))

Included in the following conference series:

  • 2006 Accesses

Abstract

This paper analyzes the study of the ASP.NET application process, three elements of security (authentication, authorization, fake) their own characteristics;Secondly, in detail ASP.NET environment based on common security vulnerabilities and security architecture asp.net environment; Finally, the study of the IIS and ASP.NET authentication mode application, and authorization mechanisms, and their intranet and internet environment to achieve the security policy configuration. As Intemet application developers, we should recognize that ASP.NET applications use a lot of users, a number of potential uses and a variety of different security requirements, so the application process to ensure the appropriate use of defense mechanisms, it also To ensure efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zhou, j.: The Exploration of Data Transfer Mode between ASP and ASP.NET Page. Microcomputer Information 5-3, 114–115 (2006)

    Google Scholar 

  2. Zhou, j., Liu, q.: The System Safety Research and Design based on.NET Framework. Communications Technology (May 2008)

    Google Scholar 

  3. Wei-yuxin: Network Invasion Examination System Key Technologies Research. Beijing University of Posts and Telecommunications doctorate paper (2008)

    Google Scholar 

  4. Jing, Z., Yuan, F.: The component code of each call analyze and compare based on .NET. In: Proc. Int. Symp. Intelligent Inf. Technol. Appl., IITA 2009 (EI 20101012756764). IEEE Computer Society press, Los Alamitos (2009) 10.1109/IITA.2009.60

    Google Scholar 

  5. Wang, W.: Asp.net Techniques. people’s press, Beijing (2005)

    Google Scholar 

  6. Yang, K., Meng, F., Wen, C.: Inflammation. Asp.net + SQL SERVER Dynamic Web Development from the Foundation to Practice. Electronic Industry Press, Beijing (2005)

    Google Scholar 

  7. Chu,Y.: Asp.net Application Security Flaws and Prevention Strategies. Journal of Anhui: Anhui (2007)

    Google Scholar 

  8. Li, X., Shuan, l., Zou, J.: Asp.net Technology Development (January 2005)

    Google Scholar 

  9. Jing, Z., Yuan, F.: The examinational technology of invasion analysis based on network security. In: Proc. IITA Int. Conf. Control Autom. Syst. Eng., CASE 2009 (EI 20094712474583), pp. 624–627. IEEE Computer Society press, Los Alamitos (2009), doi:10.1109/CASE.2009.145

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jing, Z. (2011). The Analysis of the Safety Defects Based on ASP.NET. In: Dai, M. (eds) Innovative Computing and Information. ICCIC 2011. Communications in Computer and Information Science, vol 231. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23993-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23993-9_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23992-2

  • Online ISBN: 978-3-642-23993-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics