To obtain access to full text of journal and articles you must register!
- Article name
- Development of methods for vulnerability assessment, selection and implementation of cryptographic protection of the trilateral exchange of information in web-applications model Comet
- Authors
- Tyulkin M. V., , info@learn-about.me, State National Research Politechnical University of Perm, Perm, Russia
Kapger I. V., , kapger@mail.ru, Moscow Power Engineering Institute (MPEI); State National Research Politechnical University of Perm, Moscow, Russia
Krotova E. L., , lenkakrotova@yandex.ru, State National Research Politechnical University of Perm, Perm, Russia
Krotov L. N., , levkrotov@yandex.ru, State National Research Politechnical University of Perm, Perm, Russia
- Keywords
- information security / web-application / the model Comet / active attacks / passive attacks / the cryptographic scheme / encryption / digital signature / the vulnerability of web-based application
- Year
- 2012 Issue 2 Pages 6 - 12
- Code EDN
- Code DOI
- Abstract
- This paper analyzes the vulnerability model of web-based application using the Comet pattern of information exchange WebSocket Streaming, which is specific to the exchange of information between the three parties. Based on this analysis and various behavioral models forecast the attacker made possible the realization of active and passive attacks on this information exchange. To protect against predicted attacks proposed two schemes for the protection of information processing applications, non-confidential and confidential information, respectively.
- Text
- To obtain access to full text of journal and articles you must register!
- Buy