[1]姚剑 徐汀荣 梅娟.基于Applet的Telnet功能与实现[J].计算机技术与发展,2006,(01):210-212.
 YAO Jian,xg Ting-rong,MEI Juan.Functions and Implementation of Telnet Based on Applet[J].,2006,(01):210-212.
点击复制

基于Applet的Telnet功能与实现()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2006年01期
页码:
210-212
栏目:
计算机安全
出版日期:
1900-01-01

文章信息/Info

Title:
Functions and Implementation of Telnet Based on Applet
文章编号:
1005-3751(2006)01-0210-03
作者:
姚剑1 徐汀荣1 梅娟2
[1]苏州大学计算机科学与技术学院[2]东南大学集团经济与产业组织研究中心
Author(s):
YAO Jian xg Ting-rong MEI Juan
[1]School of Computer Science & Technology, Soochow University[2]Research Center of Group Economy and Industry Organization, Southeast University
关键词:
Applet程序安全通信
Keywords:
Appletsecurity communication
分类号:
TP393.08
文献标志码:
A
摘要:
介绍了在网络应用中日益重要的Java Applet所存在的优缺点,并由此讨论了产生这些优缺点的Java Applet安全模型的发展历程,进而分析了这种模型在安全性方面的优点,同时也指出了Java Applet给用户带来的不便。在分析了Java Applet安全模型结构后,提出了绕过这种安全模型实现远程登陆功能的系统架构,并列出了用Java Applet实现的基于Web的Telnet功能的部分代码
Abstract:
Analyzes the advantages and disadvantages of Java Applet, which nowadays has been greatly used on network. After that, it discusses the evolutive process of the Java Appht model that engenders these advantages and disadvantages, And it analyzes the inconvenience brought about to users by Java Applet, and the advantages that exist in the safe aspect of this model. Also puts forward a system framework that averts the safe model and achieves Telnet. Eventually, based on Web, presents some programs of Java Appht which are used to implement the application of Telnet

相似文献/References:

[1]程思 程家兴[].VPN中的隧道技术研究[J].计算机技术与发展,2010,(02):156.
 CHENG Si,CHENG Jia-xing[].A Brief Discussion on Tunnel Technical of VPN[J].,2010,(01):156.
[2]黄世权.网络存储安全分析[J].计算机技术与发展,2009,(05):170.
 HUANG Shi-quan.Analysis of Network Storage's Safety[J].,2009,(01):170.
[3]张俊妍 陈启买.SOAP协议性能与安全的研究进展[J].计算机技术与发展,2009,(06):163.
 ZHANG Jun-yan,CHEN Qi-mai.Survey on Performance and Safety of SOAP[J].,2009,(01):163.
[4]支萌萌 王汝传.一种新的P2P安全积分机制[J].计算机技术与发展,2009,(08):137.
 ZHI Meng-meng,WANG Ru-chuan.A New Secure Incentive Mechanism in Peer- to- Peer System[J].,2009,(01):137.
[5]孙丽艳.基于激励机制的认知无线电自私行为研究[J].计算机技术与发展,2009,(10):170.
 SUN Li-yan.Study of Cognitive Radio' Selfish Behavior Based on Two- Stage Incentives Mechanism[J].,2009,(01):170.
[6]贺锋 王汝传.一种基于PKI的P2P身份认证技术[J].计算机技术与发展,2009,(10):181.
 HE Feng,WANG Ru-chuan.A Peer- to- Peer Identity Authentication Technology Based on PKI[J].,2009,(01):181.
[7]赵昌伦 武波.基于.Net的军队计算机网络信息安全对策[J].计算机技术与发展,2009,(01):150.
 ZHAO Chang-lun,WU Bo.Information Security Countermeasures of Army Computer Networks Based on . Net[J].,2009,(01):150.
[8]吕武玲 黎忠文.SIP中基于身份认证的安全机制研究[J].计算机技术与发展,2009,(02):158.
 LU Wu-ling,LI Zhong-wen.Research on Identity- Based Authentication in SIP[J].,2009,(01):158.
[9]蔡诗维 钟诚.基于兴趣社群的P2P网络节点自治管理方法[J].计算机技术与发展,2008,(03):161.
 CAI Shi-wei,ZHONG Cheng.A Self- Governing Management Approach in P2P Network Based on Interest Community[J].,2008,(01):161.
[10]黄科文 郑洪源 丁秋林.移动Agent系统JADE-S的研究与改进[J].计算机技术与发展,2008,(03):165.
 HUANG Ke-wen,ZHENG Hong-yuan,DING Qiu-lin.Research and Improvement on JADE - S of Mobile Agent[J].,2008,(01):165.

备注/Memo

备注/Memo:
姚剑(1980-),男。江苏人,硕士研究生,研究方向为网络与数据库;徐汀荣,教授,研究方向为网络与数据库
更新日期/Last Update: 1900-01-01