TY - GEN
T1 - Research of security vulnerability in the computer network
AU - Fu, Cuijiao
PY - 2010
Y1 - 2010
N2 - In order to solve the problem of security vulnerability in the computer network radically, it was studied for the cause of vulnerability. Solving scheme was put forward aim at one kind of vulnerability, that is, by the special scan and encryption techniques, it makes attacker can't bypass its access control. In this way, it can avoid the vulnerability caused by the error of access verification. Finally, it pointed out that the method solving vulnerability problem according to the cause of vulnerability will be the development trend to study the vulnerability.
AB - In order to solve the problem of security vulnerability in the computer network radically, it was studied for the cause of vulnerability. Solving scheme was put forward aim at one kind of vulnerability, that is, by the special scan and encryption techniques, it makes attacker can't bypass its access control. In this way, it can avoid the vulnerability caused by the error of access verification. Finally, it pointed out that the method solving vulnerability problem according to the cause of vulnerability will be the development trend to study the vulnerability.
KW - Access control
KW - Access verification
KW - Encrypt
KW - Scan
KW - Security vulnerability
KW - System security
UR - https://www.scopus.com/pages/publications/77953298851
U2 - 10.1109/ICBECS.2010.5462385
DO - 10.1109/ICBECS.2010.5462385
M3 - 会议稿件
AN - SCOPUS:77953298851
SN - 9781424453153
T3 - 2010 International Conference on Biomedical Engineering and Computer Science, ICBECS 2010
BT - 2010 International Conference on Biomedical Engineering and Computer Science, ICBECS 2010
T2 - 2010 International Conference on Biomedical Engineering and Computer Science, ICBECS 2010
Y2 - 23 April 2010 through 25 April 2010
ER -