A New Type of the Research and Deployment Strategy for Web-Page Tamper-Resistant

Article Preview

Abstract:

This paper presents a system architecture through a new type of strategy for web-page tamper-resistant. The new strategy emphasizes the following points: by using of file filter technology timely find out and block the malicious tampering so that the illegal malicious tampering is prevented; the tamper-resistant module and digital watermark module are distributed in two different servers and the servers are separated by a firewall to strengthen the overall security of the system; to ensure the security of the tamper-resistant process, it is necessary to deployment a single chip machine to protect the tamper-resistant process.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

927-932

Citation:

Online since:

August 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] CNCERT/CC China Internet Network Security Report (First half of 2010) [R] Beijing: National Computer Network Emergency Response Technical Team Coordination Centre, 2010. (in Chinese).

Google Scholar

[2] Wang X Y, Lai X J, Feng D G, et al. Cryptanalysis of the hash functionsMD4 and RIPEMD, [C]/Cramer (ed). EUROCRYPT 2005, LNCS 3494. Berlin: Springer-Verlag, 2005, pp.1-18.

Google Scholar

[3] Wang X Y, Yiqun Lisa Yin, Yu H B. Finding collisions in the full SHA-1[C]/Shoup (ed). CRYPTO 2005, LNCS 3621. Berlin: Springer-Verlag, 2005, pp.17-36.

Google Scholar

[4] Wang X Y, YuHB. Howto breakMD5 and other hash functions[C]/Cramer (ed). EUROCRYPT2005, LNCS 3494. Berlin: Springer-Verlag, 2005, pp.19-35.

Google Scholar

[5] Wang X Y, Yu H B, Yiqun Lisa Yin. Efficient collision search attacks on SHA-0[C]/Shoup (ed). CRYPTO 2005, LNCS 3621. Berlin: Springer-Verlag, 2005, pp.1-16.

Google Scholar

[6] Wen Tan, Xiao Yang, Jianlei Shao. Painting alone in winter –windows Kernel security programming [M] Beijing:Electronic Industry Press, 2009, pp.163-212 (in Chinese.

Google Scholar