Computer Network Security Technology Based on Java

With the rapid development of Internet, network security occupies the primary position in computer technology. It is mainly to ensure the security of information, can make the information in the network safe transmission. Next, also want to prevent the invasion of soft virus infection. At present, t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of physics. Conference series Jg. 2143; H. 1; S. 12019 - 12023
Hauptverfasser: Gao, Qi, Bai, Jinniu
Format: Journal Article
Sprache:Englisch
Veröffentlicht: IOP Publishing 01.12.2021
Schlagworte:
ISSN:1742-6588, 1742-6596
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract With the rapid development of Internet, network security occupies the primary position in computer technology. It is mainly to ensure the security of information, can make the information in the network safe transmission. Next, also want to prevent the invasion of soft virus infection. At present, there are many kinds of technologies to maintain network information security. Such as firewalls, anti-virus software technology, file encryption and digital signature technology. This paper describes the vulnerability of network security and the importance of maintaining its security, mainly study the role of Java in computer network security technology and its application in which, finally based on Java network security technology and some other comparison, draw its advantages.
AbstractList With the rapid development of Internet, network security occupies the primary position in computer technology. It is mainly to ensure the security of information, can make the information in the network safe transmission. Next, also want to prevent the invasion of soft virus infection. At present, there are many kinds of technologies to maintain network information security. Such as firewalls, anti-virus software technology, file encryption and digital signature technology. This paper describes the vulnerability of network security and the importance of maintaining its security, mainly study the role of Java in computer network security technology and its application in which, finally based on Java network security technology and some other comparison, draw its advantages.
Author Gao, Qi
Bai, Jinniu
Author_xml – sequence: 1
  givenname: Qi
  surname: Gao
  fullname: Gao, Qi
  organization: Medical Informatics Teaching and Research Section, Baotou Medical College , , China
– sequence: 2
  givenname: Jinniu
  surname: Bai
  fullname: Bai, Jinniu
  organization: Medical Informatics Teaching and Research Section, Baotou Medical College , , China
BookMark eNqNj9tKw0AQhhepYFt9BvdaiNlDdpO91OCpFBVar5fNHjS1zYZNquTtTYwUBC-cm39g5hvmm4FJ5SsLwDlGlxhlWYzThEScCR4TnNAYxwgThMURmB4mk0OfZSdg1jQbhGhf6RSQ3O_qfWsDfLTtpw_vcGX1PpRtB9dWv1V-6187eK0aa6Cv4EJ9qFNw7NS2sWc_OQcvtzfr_D5aPt095FfLSJOEiwg7Z7QljheCKM6NYloYVCQ0NYKm2FCKTWK_o-BcIMtc4piwjBGhVYroHKTjXR180wTrZB3KnQqdxEgO6nKQkoOgHNQllqN6T9KRLH0tN34fqv7Pf1AXf1CL53z1e1HWxtEvzstp7Q
ContentType Journal Article
Copyright Published under licence by IOP Publishing Ltd
Copyright_xml – notice: Published under licence by IOP Publishing Ltd
DBID O3W
TSCCA
AAYXX
CITATION
DOI 10.1088/1742-6596/2143/1/012019
DatabaseName Institute of Physics Open Access Journal Titles
IOPscience (Open Access)
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList CrossRef
Database_xml – sequence: 1
  dbid: O3W
  name: Institute of Physics Open Access Journal Titles
  url: http://iopscience.iop.org/
  sourceTypes:
    Enrichment Source
    Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Physics
EISSN 1742-6596
ExternalDocumentID 10_1088_1742_6596_2143_1_012019
JPCS_2143_1_012019
GroupedDBID 1JI
29L
2WC
4.4
5B3
5GY
5PX
5VS
7.Q
AAJIO
AAJKP
ABHWH
ACAFW
ACHIP
AEFHF
AEJGL
AFKRA
AFYNE
AIYBF
AKPSB
ALMA_UNASSIGNED_HOLDINGS
ARAPS
ASPBG
ATQHT
AVWKF
AZFZN
BENPR
BGLVJ
CCPQU
CEBXE
CJUJL
CRLBU
CS3
DU5
E3Z
EBS
EDWGO
EQZZN
F5P
FRP
GROUPED_DOAJ
GX1
HCIFZ
HH5
IJHAN
IOP
IZVLO
J9A
KNG
KQ8
LAP
N5L
N9A
O3W
OK1
P2P
PIMPY
PJBAE
RIN
RNS
RO9
ROL
SY9
T37
TR2
TSCCA
UCJ
W28
XSB
~02
AAYXX
AEINN
AFFHD
CITATION
OVT
PHGZM
PHGZT
PQGLB
ID FETCH-LOGICAL-c2469-1ffdce2f6b92a66da5c9d0b437d9371d331d4ed331db6690e5f4f59e5529ca703
IEDL.DBID O3W
ISSN 1742-6588
IngestDate Sat Nov 29 02:07:20 EST 2025
Tue Dec 14 22:30:43 EST 2021
Wed Aug 21 03:35:52 EDT 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
License Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2469-1ffdce2f6b92a66da5c9d0b437d9371d331d4ed331db6690e5f4f59e5529ca703
OpenAccessLink https://iopscience.iop.org/article/10.1088/1742-6596/2143/1/012019
PageCount 5
ParticipantIDs iop_journals_10_1088_1742_6596_2143_1_012019
crossref_primary_10_1088_1742_6596_2143_1_012019
PublicationCentury 2000
PublicationDate 20211201
PublicationDateYYYYMMDD 2021-12-01
PublicationDate_xml – month: 12
  year: 2021
  text: 20211201
  day: 01
PublicationDecade 2020
PublicationTitle Journal of physics. Conference series
PublicationTitleAlternate J. Phys.: Conf. Ser
PublicationYear 2021
Publisher IOP Publishing
Publisher_xml – name: IOP Publishing
References Wang (JPCS_2143_1_012019bib3) 2017; 4
Shen (JPCS_2143_1_012019bib8) 2019; 12
Teng (JPCS_2143_1_012019bib2) 2020; 416
Xu (JPCS_2143_1_012019bib10) 2018; 24
Lu (JPCS_2143_1_012019bib7) 2016; 000
Xing (JPCS_2143_1_012019bib5) 2017; 000
Su (JPCS_2143_1_012019bib1) 2017; 000
Li (JPCS_2143_1_012019bib9) 2019; 7
Liu (JPCS_2143_1_012019bib6) 2017; 13
Zou (JPCS_2143_1_012019bib4) 2020; 11
References_xml – volume: 24
  start-page: 2
  year: 2018
  ident: JPCS_2143_1_012019bib10
  article-title: Application of Java in High Concurrency Network Programming [J]
  publication-title: Digital Users
– volume: 000
  start-page: 49
  year: 2017
  ident: JPCS_2143_1_012019bib5
  article-title: Security Research based on Java Development Platform [J]
  publication-title: Computer Nerd
– volume: 7
  start-page: 0029
  year: 2019
  ident: JPCS_2143_1_012019bib9
  article-title: Research on Characteristics and Technology of Java Programming based on Computer Software [J]
  publication-title: Information Week
– volume: 000
  start-page: 48
  year: 2017
  ident: JPCS_2143_1_012019bib1
  article-title: Research on JAVA Programming Language based on Computer Software security Development [J]
  publication-title: Network Security Technology and Application
– volume: 000
  start-page: 196
  year: 2016
  ident: JPCS_2143_1_012019bib7
  article-title: Design and Implementation of Network Security Management System based on J2EE
  publication-title: Electronic Technique and Software Engineering
– volume: 4
  year: 2017
  ident: JPCS_2143_1_012019bib3
  article-title: Using Java programming to improve the security of Computer Network Communication [J]
  publication-title: Electronic Production
– volume: 13
  start-page: 19
  year: 2017
  ident: JPCS_2143_1_012019bib6
  article-title: Research on Improving Network Communication Security Based on Java Programming [J]
  publication-title: Computer Knowledge and Technology
– volume: 416
  start-page: 169
  year: 2020
  ident: JPCS_2143_1_012019bib2
  article-title: Research on Information Security and Protection of Computer Network in The Era of Big Data [J]
  publication-title: Computer Programming Skills and Maintenance
– volume: 11
  start-page: 68
  year: 2020
  ident: JPCS_2143_1_012019bib4
  article-title: Characteristics and Technology Application of Java Programming for Computer Software [J]
  publication-title: Heilongjiang Science
– volume: 12
  start-page: 67
  year: 2019
  ident: JPCS_2143_1_012019bib8
  article-title: Analysis of CorBA-based Computer Network Management Based on JAVA [J]
  publication-title: Computer Products and Circulation
SSID ssj0033337
Score 2.286167
Snippet With the rapid development of Internet, network security occupies the primary position in computer technology. It is mainly to ensure the security of...
SourceID crossref
iop
SourceType Index Database
Enrichment Source
Publisher
StartPage 12019
SubjectTerms Computer Technology
Java Programming
Java Technology
Network Security
Network Technology
Title Computer Network Security Technology Based on Java
URI https://iopscience.iop.org/article/10.1088/1742-6596/2143/1/012019
Volume 2143
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIOP
  databaseName: Institute of Physics Open Access Journal Titles
  customDbUrl:
  eissn: 1742-6596
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0033337
  issn: 1742-6588
  databaseCode: O3W
  dateStart: 20040101
  isFulltext: true
  titleUrlDefault: http://iopscience.iop.org/
  providerName: IOP Publishing
– providerCode: PRVPQU
  databaseName: Advanced Technologies & Aerospace Database
  customDbUrl:
  eissn: 1742-6596
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0033337
  issn: 1742-6588
  databaseCode: P5Z
  dateStart: 20040801
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1742-6596
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0033337
  issn: 1742-6588
  databaseCode: BENPR
  dateStart: 20040801
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Publicly Available Content Database
  customDbUrl:
  eissn: 1742-6596
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0033337
  issn: 1742-6588
  databaseCode: PIMPY
  dateStart: 20040801
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8NAEF60VfDiW6yPsqBHY7OvJHu0pUV6iMUq9rZsdjfgJS1t7e938kJzEBHMJSHMDsvH7sxs8s0MQrfSpmD0pPCI843HOTOw52ziJcQlQofUMV8XzSbCOI5mM9nIhZkvKtN_D49loeASwooQF_UghqZeIGTQo-Dse6SX53_mlT_bLAJvDmv6ib3V1pjBFZZJkfmgKKo5Xj8raniobZjFN4czOviPqR6i_SrcxA_liCO05bJjtFvQPs3qBNG6qQOOSzo4nlb97PDXN3fcB09n8TzDY73Rp-h1NHwZPHpVFwXPUDj7eiRNrXE0DRJJdRBYLYy0fsJZaPNaeJYxYrkrbkkAZ2UnUp4K6YSg0mgwCGeolc0zd46wTZjhGtRYTTi1EK1ReCMNJQH1Decd5NfIqUVZLEMVP7mjSOVQqBwKlUOhiCqh6KA7AE9VG2f1u_hNQ3w8GUybEmph04u_Kb1EezRnqhQklSvUWi8_3DXaMZv1-2rZRe3-MJ48d4tl9Qldb8LL
linkProvider IOP Publishing
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LT8MwDLa28RAX3ojxrARHSps07ZojDCoYqEwaiN2iNEklLtu0jf1-nLYDdkAIiV5aVY4VfUpsp_1sA5xznaPR46FLjK9cxgKFe05nbkZMFsoWNYEvi2YTrTSN-33erUHymQszHFWm_xIfy0LBJYQVIS72MIambhTyyKPo7D3i2fxPwr2RzuuwZMuV2NX9FLzOLXKAV6tMjLQD43jO8_pZ2YKXquNMvjmdZOO_prsJ61XY6VyVo7agZgbbsFLQP9VkB-i8uYOTlrRwp1f1tXO-vr071-jxtDMcOB05k7vwktw-t-_cqpuCqyiegV2S51oZmkcZpzKKtAwV137Ggpa2NfF0EBDNTHHLIjwzmzBnechNiHgqiYZhDxqD4cDsg6OzQDGJarQkjGqM2ii-4YqSiPqKsSb4c_TEqCyaIYqf3XEsLBzCwiEsHIKIEo4mXCCAotpAk9_FzxbEO912b1FCIL4Hf1N6Cqvdm0Q83qcPh7BGLXml4K0cQWM6fjfHsKxm07fJ-KRYXR89BsaZ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Computer+Network+Security+Technology+Based+on+Java&rft.jtitle=Journal+of+physics.+Conference+series&rft.au=Gao%2C+Qi&rft.au=Bai%2C+Jinniu&rft.date=2021-12-01&rft.pub=IOP+Publishing&rft.issn=1742-6588&rft.eissn=1742-6596&rft.volume=2143&rft.issue=1&rft_id=info:doi/10.1088%2F1742-6596%2F2143%2F1%2F012019&rft.externalDocID=JPCS_2143_1_012019
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1742-6588&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1742-6588&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1742-6588&client=summon