Computer Network Security Technology Based on Java
With the rapid development of Internet, network security occupies the primary position in computer technology. It is mainly to ensure the security of information, can make the information in the network safe transmission. Next, also want to prevent the invasion of soft virus infection. At present, t...
Uložené v:
| Vydané v: | Journal of physics. Conference series Ročník 2143; číslo 1; s. 12019 - 12023 |
|---|---|
| Hlavní autori: | , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
IOP Publishing
01.12.2021
|
| Predmet: | |
| ISSN: | 1742-6588, 1742-6596 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | With the rapid development of Internet, network security occupies the primary position in computer technology. It is mainly to ensure the security of information, can make the information in the network safe transmission. Next, also want to prevent the invasion of soft virus infection. At present, there are many kinds of technologies to maintain network information security. Such as firewalls, anti-virus software technology, file encryption and digital signature technology. This paper describes the vulnerability of network security and the importance of maintaining its security, mainly study the role of Java in computer network security technology and its application in which, finally based on Java network security technology and some other comparison, draw its advantages. |
|---|---|
| AbstractList | With the rapid development of Internet, network security occupies the primary position in computer technology. It is mainly to ensure the security of information, can make the information in the network safe transmission. Next, also want to prevent the invasion of soft virus infection. At present, there are many kinds of technologies to maintain network information security. Such as firewalls, anti-virus software technology, file encryption and digital signature technology. This paper describes the vulnerability of network security and the importance of maintaining its security, mainly study the role of Java in computer network security technology and its application in which, finally based on Java network security technology and some other comparison, draw its advantages. |
| Author | Gao, Qi Bai, Jinniu |
| Author_xml | – sequence: 1 givenname: Qi surname: Gao fullname: Gao, Qi organization: Medical Informatics Teaching and Research Section, Baotou Medical College , , China – sequence: 2 givenname: Jinniu surname: Bai fullname: Bai, Jinniu organization: Medical Informatics Teaching and Research Section, Baotou Medical College , , China |
| BookMark | eNqNj9tKw0AQhhepYFt9BvdaiNlDdpO91OCpFBVar5fNHjS1zYZNquTtTYwUBC-cm39g5hvmm4FJ5SsLwDlGlxhlWYzThEScCR4TnNAYxwgThMURmB4mk0OfZSdg1jQbhGhf6RSQ3O_qfWsDfLTtpw_vcGX1PpRtB9dWv1V-6187eK0aa6Cv4EJ9qFNw7NS2sWc_OQcvtzfr_D5aPt095FfLSJOEiwg7Z7QljheCKM6NYloYVCQ0NYKm2FCKTWK_o-BcIMtc4piwjBGhVYroHKTjXR180wTrZB3KnQqdxEgO6nKQkoOgHNQllqN6T9KRLH0tN34fqv7Pf1AXf1CL53z1e1HWxtEvzstp7Q |
| ContentType | Journal Article |
| Copyright | Published under licence by IOP Publishing Ltd |
| Copyright_xml | – notice: Published under licence by IOP Publishing Ltd |
| DBID | O3W TSCCA AAYXX CITATION |
| DOI | 10.1088/1742-6596/2143/1/012019 |
| DatabaseName | Institute of Physics Journals Open Access IOPscience (Open Access) CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | CrossRef |
| Database_xml | – sequence: 1 dbid: O3W name: Institute of Physics Journals Open Access url: http://iopscience.iop.org/ sourceTypes: Enrichment Source Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Physics |
| EISSN | 1742-6596 |
| ExternalDocumentID | 10_1088_1742_6596_2143_1_012019 JPCS_2143_1_012019 |
| GroupedDBID | 1JI 29L 2WC 4.4 5B3 5GY 5PX 5VS 7.Q AAJIO AAJKP ABHWH ACAFW ACHIP AEFHF AEJGL AFKRA AFYNE AIYBF AKPSB ALMA_UNASSIGNED_HOLDINGS ARAPS ASPBG ATQHT AVWKF AZFZN BENPR BGLVJ CCPQU CEBXE CJUJL CRLBU CS3 DU5 E3Z EBS EDWGO EQZZN F5P FRP GROUPED_DOAJ GX1 HCIFZ HH5 IJHAN IOP IZVLO J9A KNG KQ8 LAP N5L N9A O3W OK1 P2P PIMPY PJBAE RIN RNS RO9 ROL SY9 T37 TR2 TSCCA UCJ W28 XSB ~02 AAYXX AEINN AFFHD CITATION OVT PHGZM PHGZT PQGLB |
| ID | FETCH-LOGICAL-c2469-1ffdce2f6b92a66da5c9d0b437d9371d331d4ed331db6690e5f4f59e5529ca703 |
| IEDL.DBID | O3W |
| ISSN | 1742-6588 |
| IngestDate | Sat Nov 29 02:07:20 EST 2025 Tue Dec 14 22:30:43 EST 2021 Wed Aug 21 03:35:52 EDT 2024 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Language | English |
| License | Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI. |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c2469-1ffdce2f6b92a66da5c9d0b437d9371d331d4ed331db6690e5f4f59e5529ca703 |
| OpenAccessLink | https://iopscience.iop.org/article/10.1088/1742-6596/2143/1/012019 |
| PageCount | 5 |
| ParticipantIDs | iop_journals_10_1088_1742_6596_2143_1_012019 crossref_primary_10_1088_1742_6596_2143_1_012019 |
| PublicationCentury | 2000 |
| PublicationDate | 20211201 |
| PublicationDateYYYYMMDD | 2021-12-01 |
| PublicationDate_xml | – month: 12 year: 2021 text: 20211201 day: 01 |
| PublicationDecade | 2020 |
| PublicationTitle | Journal of physics. Conference series |
| PublicationTitleAlternate | J. Phys.: Conf. Ser |
| PublicationYear | 2021 |
| Publisher | IOP Publishing |
| Publisher_xml | – name: IOP Publishing |
| References | Wang (JPCS_2143_1_012019bib3) 2017; 4 Shen (JPCS_2143_1_012019bib8) 2019; 12 Teng (JPCS_2143_1_012019bib2) 2020; 416 Xu (JPCS_2143_1_012019bib10) 2018; 24 Lu (JPCS_2143_1_012019bib7) 2016; 000 Xing (JPCS_2143_1_012019bib5) 2017; 000 Su (JPCS_2143_1_012019bib1) 2017; 000 Li (JPCS_2143_1_012019bib9) 2019; 7 Liu (JPCS_2143_1_012019bib6) 2017; 13 Zou (JPCS_2143_1_012019bib4) 2020; 11 |
| References_xml | – volume: 24 start-page: 2 year: 2018 ident: JPCS_2143_1_012019bib10 article-title: Application of Java in High Concurrency Network Programming [J] publication-title: Digital Users – volume: 000 start-page: 49 year: 2017 ident: JPCS_2143_1_012019bib5 article-title: Security Research based on Java Development Platform [J] publication-title: Computer Nerd – volume: 7 start-page: 0029 year: 2019 ident: JPCS_2143_1_012019bib9 article-title: Research on Characteristics and Technology of Java Programming based on Computer Software [J] publication-title: Information Week – volume: 000 start-page: 48 year: 2017 ident: JPCS_2143_1_012019bib1 article-title: Research on JAVA Programming Language based on Computer Software security Development [J] publication-title: Network Security Technology and Application – volume: 000 start-page: 196 year: 2016 ident: JPCS_2143_1_012019bib7 article-title: Design and Implementation of Network Security Management System based on J2EE publication-title: Electronic Technique and Software Engineering – volume: 4 year: 2017 ident: JPCS_2143_1_012019bib3 article-title: Using Java programming to improve the security of Computer Network Communication [J] publication-title: Electronic Production – volume: 13 start-page: 19 year: 2017 ident: JPCS_2143_1_012019bib6 article-title: Research on Improving Network Communication Security Based on Java Programming [J] publication-title: Computer Knowledge and Technology – volume: 416 start-page: 169 year: 2020 ident: JPCS_2143_1_012019bib2 article-title: Research on Information Security and Protection of Computer Network in The Era of Big Data [J] publication-title: Computer Programming Skills and Maintenance – volume: 11 start-page: 68 year: 2020 ident: JPCS_2143_1_012019bib4 article-title: Characteristics and Technology Application of Java Programming for Computer Software [J] publication-title: Heilongjiang Science – volume: 12 start-page: 67 year: 2019 ident: JPCS_2143_1_012019bib8 article-title: Analysis of CorBA-based Computer Network Management Based on JAVA [J] publication-title: Computer Products and Circulation |
| SSID | ssj0033337 |
| Score | 2.28607 |
| Snippet | With the rapid development of Internet, network security occupies the primary position in computer technology. It is mainly to ensure the security of... |
| SourceID | crossref iop |
| SourceType | Index Database Enrichment Source Publisher |
| StartPage | 12019 |
| SubjectTerms | Computer Technology Java Programming Java Technology Network Security Network Technology |
| Title | Computer Network Security Technology Based on Java |
| URI | https://iopscience.iop.org/article/10.1088/1742-6596/2143/1/012019 |
| Volume | 2143 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIOP databaseName: Institute of Physics Journals Open Access customDbUrl: eissn: 1742-6596 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0033337 issn: 1742-6588 databaseCode: O3W dateStart: 20040101 isFulltext: true titleUrlDefault: http://iopscience.iop.org/ providerName: IOP Publishing – providerCode: PRVPQU databaseName: ProQuest advanced technologies & aerospace journals customDbUrl: eissn: 1742-6596 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0033337 issn: 1742-6588 databaseCode: P5Z dateStart: 20040801 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1742-6596 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0033337 issn: 1742-6588 databaseCode: BENPR dateStart: 20040801 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: Publicly Available Content Database customDbUrl: eissn: 1742-6596 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0033337 issn: 1742-6588 databaseCode: PIMPY dateStart: 20040801 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NS8MwFA-6KXjxW5wfI6BH49qkSZujGxuyQx1OcbeQ5gO8dGOb-_tN-oH2ICLYS3t4CeHXNL-X9PfeA-DWSitjwiNEqWUo4pog5zdzxGRASOYYhaugKDYRp2kym_FGLMx8US399-6xTBRcQlgJ4pKe86ExYpSzHnZk3wt7Pv7TZ_5sk8SxuZvTT-StXo2Ju-IyKNI3SpJa4_VzRw2G2naj-EY4o4P_GOoh2K_cTfhQtjgCWyY_BruF7FOtTgCuizrAtJSDw2lVzw5-nbnDvmM6Dec5HMuNPAWvo-HL4BFVVRSQwm7vi0JrtTLYsoxjyZiWVHEdZBGJtc-FpwkJdWSKW8bcXtlQG1nKDaXuPUm3IJyBVj7PzTmAMZGWa2Y4do6H1kSSQIaBDjOKlU1U1gFBjZxYlMkyRPGTO0mEh0J4KISHQoSihKID7hx4ovpwVr-b3zTMx5PBtGkhFtpe_K3TS7CHvVKlEKlcgdZ6-WGuwY7arN9Xyy5o94fp5LlbTKtP3ebCig |
| linkProvider | IOP Publishing |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwED615SEW3ojyjAQjIYkdO_EIhQgKCpUKopvl2LHEklZt6e_HTlKgA0JIZEmGs2V9cu47J9_dAZxroUWEWegSoqkbMoVdEzczlwof48wwCpN-2WwiStN4MGC9BiSfuTDDUe36L81jVSi4grAWxMWeiaGRSwmjHjJk7wWezf8MmDdSuglLtlyJ3d1P-HXukbG5oiox0g6M47nO6-fJFliqaVbyjXSSjf9a7ias12Gnc1WN2oJGXmzDSin_lJMdQPPmDk5aycKdft3Xzvn69u5cG8ZTzrBwumImduEluX3u3Ll1NwVXInMGdgOtlcyRphlDglIliGTKz0IcKVsTT2EcqDAvbxk1Z-ac6FATlhODpxTGMexBqxgW-T44ERaaKZozZAIQpbDAvgh8FWQESR3LrA3-HD0-qopm8PJndxxzCwe3cHALBw94BUcbLgyAvH6BJr-bny2Yd3ud_qIFN_ge_G3SU1jt3ST88T59OIQ1ZMUrpW7lCFrT8Xt-DMtyNn2bjE_K3fUBt0LGWA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Computer+Network+Security+Technology+Based+on+Java&rft.jtitle=Journal+of+physics.+Conference+series&rft.au=Gao%2C+Qi&rft.au=Bai%2C+Jinniu&rft.date=2021-12-01&rft.pub=IOP+Publishing&rft.issn=1742-6588&rft.eissn=1742-6596&rft.volume=2143&rft.issue=1&rft_id=info:doi/10.1088%2F1742-6596%2F2143%2F1%2F012019&rft.externalDocID=JPCS_2143_1_012019 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1742-6588&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1742-6588&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1742-6588&client=summon |