设计开题报告计算_第1页
设计开题报告计算_第2页
设计开题报告计算_第3页
设计开题报告计算_第4页
设计开题报告计算_第5页
已阅读5页,还剩17页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

LAMPLAMP1.11.1.2.(2)2.2LAMPLAMPLinuxApacheMySQLPHP四个开源软件构成的开放资源2.2LAMPLAMPLinuxApacheMySQLPHP四个开源软件构成的开放资源Apache服务器,令其辨识不同的主机名。2.2.3Linux2.3LAMP(Linux+Apache+Mysql+Php)1.addingthe2.checktherevisetheDeletetheLinuxApache网络服务器,MysqlPHPLinuxApache网络服务器,MysqlPHPLAMP设计(论文)起止时间:201491920155301571112910121314(包括国内外现状、研究方向、进展情况、存在问题、参考依据等(包括国内外现状、研究方向、进展情况、存在问题、参考依据等1.1.发。ASPASP务器、MySQLPHPWeb应用程掌握”特性,使得它的网络开发更加有效[7]。LAMPLAMP得更加具有竞争力,更加能吸引客户。开放源代码的LAMP使用高性能的操作系统Linux)、高性能的网页服务器Apache)、高性能的数据库(MySQL)、高效率的编程语言(PHP)WebLAMPLinuxWindowsUnix具有先天的优势。一方面是LinuxLinux对硬件的要求较低,跨Windows网络系统相比,Linux系统的网络性能优异,具有较好的稳定性、高效性和安全性。Linux处在最底层,提供操作系统。灵活性和可定制化的特点使它能够产生一种高度定制的平台,让其它组件在上面运行。Apache,PHPMySQLWindows(IISwebApache)上[8]。LinuxLAMP组合的基础,它的安全关系到整个系统的稳定,只有保证LinuxUnixWindows、ApacheApache节点数Apache等其他服务器集成在一起。MySQL体积小,速PHP(HypertextPreprocessor,超文本预处理器的缩写)是一种当今最为流行的有开源和免费的独特优势[11]。PHPWebPHPHTMLPHPLinux+Apache+Mysql+Perl/PHP/PythonLinuxApacheWEB服务器、MySQLPHPhttp请求,都由LinuxApache服务器处理,如果请求静态页面,则将目录下存放PHPPHPPHP面返回给客户端[12]Internet的快速发展,电子商务的普及,网上购物已经成为一种很普遍的早期安装一个LAMP系统是比较复杂的,随着面返回给客户端[12]Internet的快速发展,电子商务的普及,网上购物已经成为一种很普遍的早期安装一个LAMP系统是比较复杂的,随着Linux的普及现在安装一个LAMPLinux发行版本(Redhat、Debian)安装时可Apache、php、mysql等组件。LAMP(Linux、Apache、MySQLPHP/Perl)架构的应用程序不断被强大而简单的环境[13]。按照简单的形式,基于LAMP的应用程序是用PHP这LinuxApacheWebPHPURL户机获得信息,从而确定应该执行什么操作。PHPApache的一个扩展模块进行安装的,它不能独立运行,必须依托于Apache服务器[14]。服务器会从MySQLHTML模板组合在一起,并将结果返回在内的大部分数据库[15]+PHP+MySQLLinuxMYSQLLinuxMYSQL数据库,最后安装PHPApache。PHPPHPPHPMySQL数据PHP语句时要注意的格式和语法。虞萍.虞萍.影响企业电子商务成功的网站因素研究[D].北京中国农业大张庆坏.我国同城电子商务的发展机遇及前景[J].吉林工程技术师范学院齐晶.中国电子商务发展与规制研究[D].辽宁:辽宁大学郑镇耿.LAMP环境架设Apache虚拟主机站点[J].计算机光盘软件与应彭俊.LAMP的网址导航站的设计与实现[D].南昌:南昌大学王丽娜.基于LAMP的家乐电器网上商城的开发[D].大连:大连理工大薛鸿民.基于LAMP的售书网站的设计与实现[J].科技资讯Ramana,U.V.,Prabhakar,T.V.SomeExperimentswiththePerformanceofLAMPArchitecture[C].ComputerandInformationTechnology,2005.CIT2005.TheFifthInternationalConference,2005,P916–920.黄阳.LAMP架构电商平台方案设计[J].电子商务.2013,10:44-何杭锋.基于LAMP平台的WEB服务器架构[J].中国新技术新产ZaidmanA,DemeyerS.Automaticidentificationofkeyclassesinasoftwaresystemusingwebminingtechniques[J].ResearchandPractice.2008,20(6):387–417.张麦玲,王鸿铭.LAMPWEB服务器安全架构[J].数字技术与应蒋方纯.LAMP开源软件编程模式的配置与实现[J].深圳信息职业技术学肖萍.LAMP平台的网站构建与分析[J].信息网络安全谷和启.PHP+LINUX+APACHEAttaining原稿题目PerspectivesAttaining原稿题目PerspectivesonFreeand(野生转移,并发缺陷和分布式系统故障(野生转移,并发缺陷和分布式系统故障率的编程可以颠覆这些工具的目的,进一步比较平衡的讨论,请参见五篇论文(Lipner2000;McGraw2000;Neumann2000;Schneider2000;andWittenetal.2000)LeeBadge组织和主持。这些贡献基本上都是健全这里列出的优点或缺点。Lipner探索了一些真正的好处和一些重大缺openish商业模式。Witten论文探讨经济学、指标和模型。此外,NeumannNeumann2004DARPA的报告(Neumann2003年)ACM的档案风险指数(Neumann2003b)ACM的档案风险指数(Neumann2003b)户和专家可以使他们仔细研读代码并发现弱点(Kerckhoffs1883年(2002Brown(Collar-Kotelly2002年还有一个相关的问题就是:有关被发现的漏洞信息是否需要公布。20032Slashdot的技术报告下载Anderson的重要途径,并且它经常的情况是,开放系统(或封闭的系统)PerspectivesonFreeandOpenSource“IsPerspectivesonFreeandOpenSource“Isopensourcesoftwareinherentlybetterthanclosed-sourceproprietarysoftware?”Thisisaquestionthatisfrequentlyheard,withvariousintendedmeaningsof“better.”Asaparticularlydemandingcase,letusconsidercriticalapplicationswithstringentrequirementsforcertainattributessuchassecurity,reliability,faulttolerance,humansafety,andsurvivability,allinthefaceofawiderangeofrealisticadversities—including coordinatedattacks,andactsofGod.Inaddition,let’stossinoperationalrequirementsforextensiveinteroperability,evolvability,maintainability,andcleaninterfacedesignofthosesystems,whilestillsatisfyingthecriticalrequirements.Inthiscontext,weareinterestedindeveloping,operating,andusingcomputersystemsthatarerobustandeasilyTocuttothechase,theanswertothesimplequestionposedinthefirstsentenceissimpleinconcept,butdecidedlynotsosimpleinexecution:Opensourcesoftwareisnotintrinsicallybetterthanclosed-sourceproprietarysoftware.However,ithasthepotentialforbeingbetterifitsdevelopmentprocessaddressesmanyfactorsthatarenormallyexperiencedinmass-marketproprietarysoftware,suchastheWell-definedandthoroughlyevaluatedrequirementsforsystemandapplicationbehavior,includingfunctionalrequirements,behavioralrequirements,operationalrequirements,and—aboveall—arealisticrangeofsecurityandreliabilitySystemandnetworkarchitecturesthatexplicitlyaddresstheserequirements.Soundarchitecturescanleadtosignificantcostandqualitybenefitsthroughoutthedevelopmentandlatersystemevolution.Asystemdevelopmentapproachthatexplicitlyaddressestheserequirements,pervasivelyandconsistentlythroughoutthedevelopment.。Useofprogramminglanguagesthatareinherentlyabletoavoidmanyofthecharacteristicflaws(suchasbufferoverflows,typemismatches,wildtransfers,concurrencyflaws,anddistributed-systemglitches)thattypicallyariseinunstructured,untyped,anderror-pronelanguagesandthatseemtoprevailoverdecades,throughnewsystemreleasesandnewsystems.Intelligentuseofcompilersandotherdevelopmenttoolsthathelpinidentifyingeliminatingadditionalflaws.However,sloppyprogrammingcansubverttheintentthesetools,andthesetools,andthusgoodprogrammingpracticeisstillExtensivedisciplineonthepartofdesigners,implementers,andmanagersthroughouttheentiresoftwaredevelopmentprocess.Thisultimatelyrequiresbetterintegrationofarchitecture,security,reliability,soundprogrammingtechniques,andsoftwareengineeringintothemainstreamofoureducationalandtrainingprograms.Pervasiveattentiontomaintainingconsistencywiththestatedrequirementsthroughoutoperation,administration,andmaintenance,despiteongoingsystemiterations.Somecombinationofformalandinformalapproachescanbeveryhelpfulinthisregard.Conceptually,manyproblemscanbeavoidedthroughsuitablychosenarchitectures,programminglanguages,compilers,andotheranalysistools—althoughultimately,theabilitiesofdesignersandprogrammersarealimitingfactor.Theanswertotheinitiallyposedquestionshouldnotbesurprisingtoanyonewhohashadconsiderableexperienceindevelopingsoftwarethatmustsatisfystringentrequirements.However,notethatalthoughthesamedisciplinecouldbeusedbythedevelopersofclosed-sourcesoftware,marketplaceforcestendtomakethismuchmoredifficultthanintheopensourceworld.Inparticular,thereseemstobeanincreasingtendencyamongthemass-marketproprietarysoftwaredeveloperstorushtomarket,whethertheproductisreadyornot—inessence,lettingthecustomersbethebetatesters.Furthermore,effortstoreducecostsoftenseemtoresultinlowest-common-denominatorproducts.Indeed,satisfyingstringentrequirementsforsecurityandreliability(forexample)isgenerallynotagoalthatyieldsmaximumprofits.Thus,forpracticalreasons,Iconcludethattheopen-sourceparadigmhassignificantpotentialthatismuchmoredifficulttoattaininclosed-sourceproprietarysystems.Thepotentialbenefitsofnonproprietarynonclosed-sourcesoftwarealsoincludetheabilitytomoreeasilycarryoutopenpeerreviews,addnewfunctionalityeitherlocallyortothemainlineproducts,identifyflaws,andfixthemrapidly—forexample,throughcollaborativeeffortsinvolvingpeopleirrespectiveoftheirgeographicallocationsandcorporateallegiances.Ofcourse,therisksincludeincreasedopportunitiesforevil-doerstodiscoverflawsthatcanbeexploited,andtoinserttrapdoorsandTrojanhorsesintothecode.Thusasensibleenvironmentmusthavemechanismsforensuringreliableandsecuresoftwaredistributionandlocalsystemintegrity.Itmustalsomakegooduseofsystemarchitectures,publickeyauthentication,cryptographicintegrityseals,cryptography,andtrustworthydescriptionsoftheprovenanceofindividualcomponentsandwhocryptography,andtrustworthydescriptionsoftheprovenanceofindividualcomponentsandwhohasmodifiedthem.Furtherresearchisneededonsystemsthatcanbepredictablycomposedoutofevaluatedcomponentsorthatcansurmountsomeofthevulnerabilitiesofthecomponents.Westillneedtoavoiddesignflawsandimplementationbugs,andtowarrantiesonsystemstodayaremostlyveryweak.Westilllackseriousmarketincentives.However,despiteallthechallenges,thepotentialbenefitsofrobustopen-sourcesoftwareareworthyofconsiderablecollaborativeeffort.Forafurtherfairlybalanceddiscussionoftherelativeadvantagesanddisadvantageswithrespecttoimprovingsecurity,seefivepapers(Lipner2000;McGraw2000;Neumann2000;Schneider2000;andWittenetal.2000)presentedatthe2000IEEESymposiumonSecurityandPrivacy.ThesessionwasorganizedandchairedbyLeeBadger.Thesecontributionsallessentiallyamplifytheprosand/orconsoutlinedhere.Lipnerexploressomerealbenefitsandsomesignificantdrawbacks.McGrawstatesflatlythat“openish”softwarewillnotreallyimprovesecurity.Schneidernotesthat“thelion’sshareofthevulnerabilitiescausedbysoftwarebugsiseasilydealtwithbymeansotherthansourcecodeinspections.”Healsoconsidersinhospitabilitywithbusinessmodels.TheWittenpaperexploreseconomics,metrics,andmodels.Inaddition,Neumann’sWebdevelopmentforcriticalrequirements,withparticularattentiontotherequirements,systemandnetworkarchitectures,anddevelopmentpractices.Inparticular,seeNeumann2004forareportforDARPA(summarizedbrieflyinNeumann2003a)ontheimportanceofarchitecturesinattainingprincipledassuredlytrustworthycomposablesystemsandnetworks,withparticularemphasisonopensourcebutwithgeneralapplicabilityaswell.ThatreportispartoftheDARPACHATSprogramoncomposablehigh-assurancetrustedsystems,whichisseriouslyaddressingmanyofthepromisingaspectsofmakingopen-sourcesoftwaremuchmorerobust.Furthermore,seethearchivesoftheACMRisksForum,asummaryindex(Neumann2003b)tocountlesscasesofsystemsthatfailedtoliveuptotheirrequirements,andananalysisofmanyoftheseriskscasesandwhatneedstobedonetominimizetherisks(Neumann1995).Itisanobvioustruismthatweshouldbelearningnottomakethesamemistakessoconsistently.Itisanequallyobvioustruismthattheselessonsarenotbeinglearned—mostspecificallywithrespecttoreliability,survivability,interoperability,andmanyother“-PeopleintheopensourceandfreesoftwarecommunityoftenarguethatmakingsourcecodePeopleintheopensourceandfreesoftwarecommunityoftenarguethatmakingsourcecodeavailabletoallisgoodforsecurity.Usersandexpertscanporeoverthecodeandfindvulnerabilities:“tomanyeyes,allbugsareshallow,”asEricRaymond(2001,41)putsit.Thisideaisnotentirelynew.Intheworldofcryptography,ithasbeenstandardpracticesincethenineteenthcenturytoassumethattheopponentknowsthedesignofyoursystem,sotheonlywayyoucankeephimoutisbydenyinghimknowledgeofatemporaryvariable,thekey(Kerckhoffs1883).However,opendesignisnotanideathateveryoneaccepts,evennow.Opponentsoffreesoftwarearguethat“ifthesoftwareisinthepublicdomain,thenpotentialhackershavealsohadtheopportunitytostudythesoftwarecloselytodetermineitsvulnerabilities”(Brown2002).Thisissueisnowassumingeconomicandpoliticalimportance,astheantitrustsettlementbetweenMicrosoftandtheDepartmentofJusticecompelsMicrosofttomakealotofinformationaboutinterfacesavailabletoitscompetitors—butwiththeprovisionthatdatawhosedisclosuremightprejudicesecuritymaybewithheld(Collar-Kotelly2002).Unsurprisingly,Microsoftisnowdiscoveringthatmanymoreaspectsofitssystemsaresecurity-relevantthanhadpreviouslybeenthought.Thereisarelatedissue:whetherinformationaboutdiscoveredvulnerabilitiesmaybepublished.InFebruary2003,Citibankobtainedaninjunctionprohibitinganyreportingofsecurityvulnerabilitiesofautomatictellermachinesystemsdisclosedbymyselfandtwocolleaguesatatrialwhichwewereattendingasexpertwitnesses.Thiswascounterproductiveforthebank,asitcompelledustopublishourattacksinaninvitedtalkandatechnicalreportinthedaysjustbeforethegagginghearing.Wewereslashdottedandthetechnicalreportwasdownloadedover110,000times(AndersonandBond2003;BondandZielinski2003).Butthisisunlikelytobethelasttimethatgaggingordersareusedagainstsecurityvulnerabilities;ifanything,theDigitalMillenniumCopyrightActandtheproposedEuropeanUnionDirectiveontheenforcementofintellectualpropertyrightswillmakethemevenmorecommon.Sothereisgrowingpublicinterestinthequestionofwhetheropennessisofmorevaluetotheattackerorthedefender.Thisquestionismuchmoregeneralthanwhethersoftwaresourcecodeshouldbeavailabletousers.Awiderangeofsystemsandcomponentscanbeeithereasierormoredifficulttotest,inspect,andrepair,dependingontheavailabletoolsandaccess.Hardwaredevicescanoftenbereverseengineeredsurprisinglylittleeffort—althoughthecapitalresourcesneededtofabricateaclonemightbescarce.Thedifferencebetween“open”and“closed”mayalsobelegalratherthantechnical;iflawsprohib

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论