Internet Information Server (IIS) Authentication and Authorization Models, and Locking Down File Access with EFS and WebDAV

Author(s):  
Timothy “Thor” Mullen
2014 ◽  
Vol 915-916 ◽  
pp. 1377-1381
Author(s):  
Qiu Dong Sun ◽  
Jian Cun Zuo ◽  
Yu Feng Shao ◽  
Lin Gui

In order to reform the shortcomings of common database with a slower access speed and lower security level, this paper applied sector operating directly instead of general file access, and used the distributed computing and clustering techniques to form an information server cluster as the special database system. Firstly, the layout and sector segmentation methods were provided for data access in sector based database. And then some management methods were given to control information servers in the cluster. Finally, to more efficiently schedule the tasks for storing data and querying information, a dynamic and self-adaptive scheduling algorithm was introduced into the application server of cluster. The practice shows that the system developed by this design strategy has good efficiency and security, and the access speed of the special database system is almost 25 times than that of common database.


2010 ◽  
pp. 1862-1872
Author(s):  
Volker Hockmann ◽  
Heinz D. Knoell ◽  
Ernst L. Leiss

Web servers and the Web services associated with them have become increasingly important in the last few years. Online banking, e-mail, and money, business- to-business (B2B), and business-to-client (B2C) transactions are growing rapidly. It is difficult to imagine modern business without these forms of networking. However, there are also significant negative aspects. In many cases, due to competitive pressures, companies and government agencies had to implement these services very fast, often too fast and without any appreciation of the concepts of security and protection. As a consequence, it turns out that a hacker can misuse with little effort these Web services or compromise the underlying database (e.g., to obtain access to credit cards numbers or social insurance information). A very significant percentage of the population in developed and developing countries is using wired and wireless connections for reading e-mails, accessing newsgroups, or using Internet banking. All these services are running on a Web server. Most Web servers are running the Apache or the Microsoft Internet Information Server (IIS) (all versions of both servers [Apache 1.3.x/2.x, IIS 3-6]) (Netcraft, 2006). Of these, older versions of the Internet Information Server are especially vulnerable to numerous attacks. Therefore, an attacker is in a position to break, with little effort, into many Web servers running IIS 4 or 5. However, the Apache Web server (running on Windows systems) is also vulnerable to similar attacks. Moreover, using a Web server based on UNIX or Linux is not a guarantee for a secure system. UNIX and Linux systems are also affected by inherent weaknesses and vulnerabilities such as buffer overflows and the handling of format strings (ZDNet, 2006). Readers who like to have more general insight are referred to works by Leiss (1990) and Garfinkel and Spafford (2002). These books give broader perspectives on Internet security.


Author(s):  
Volker Hockmann ◽  
Heinz D. Knoell ◽  
Ernst L. Leiss

Web servers and the Web services associated with them have become increasingly important in the last few years. Online banking, e-mail, and money, business- to-business (B2B), and business-to-client (B2C) transactions are growing rapidly. It is difficult to imagine modern business without these forms of networking. However, there are also significant negative aspects. In many cases, due to competitive pressures, companies and government agencies had to implement these services very fast, often too fast and without any appreciation of the concepts of security and protection. As a consequence, it turns out that a hacker can misuse with little effort these Web services or compromise the underlying database (e.g., to obtain access to credit cards numbers or social insurance information). A very significant percentage of the population in developed and developing countries is using wired and wireless connections for reading e-mails, accessing newsgroups, or using Internet banking. All these services are running on a Web server. Most Web servers are running the Apache or the Microsoft Internet Information Server (IIS) (all versions of both servers [Apache 1.3.x/2.x, IIS 3-6]) (Netcraft, 2006). Of these, older versions of the Internet Information Server are especially vulnerable to numerous attacks. Therefore, an attacker is in a position to break, with little effort, into many Web servers running IIS 4 or 5. However, the Apache Web server (running on Windows systems) is also vulnerable to similar attacks. Moreover, using a Web server based on UNIX or Linux is not a guarantee for a secure system. UNIX and Linux systems are also affected by inherent weaknesses and vulnerabilities such as buffer overflows and the handling of format strings (ZDNet, 2006). Readers who like to have more general insight are referred to works by Leiss (1990) and Garfinkel and Spafford (2002). These books give broader perspectives on Internet security.


2011 ◽  
pp. 2544-2564
Author(s):  
João Negreiros ◽  
Marco Painho ◽  
Fernando J. Aguilar ◽  
Manuel A. Aguilar

The present research focuses on the first software to offer spatial autocorrelation and association measures, spatial exploratory tools, variography and Ordinary Kriging spatial interpolation in the World Wide Web. Exploiting IE® (Internet Explorer), ASP® (Active Server Pages), PHP® (Hypertext Preprocessor) and IIS® (Internet Information Server) capabilities, SAKWeb© (Spatial Autocorrelation and Kriging Web) was designed in an attractive and straightforward way for any GIS user. Hence, this chapter concentrates on the technical development and design of this Internet application. The differences between server and client side techniques are emphasized in the preamble section while the following one discusses the controversial debate between GIS (Geographical Information System) and SDSS (Spatial Decision Support System) concepts. The opening prospect given by the Internet platform is presented in section three. The next section fully reviews the main technological software used for its construction. References are made to their use within SAKWeb©. Some particular capabilities as an end-user were not forgotten, as well. The conclusion section leads to some future hints regarding its potential.


Author(s):  
João Negreiros ◽  
Marco Painho ◽  
Fernando J. Aguilar ◽  
Manuel A. Aguilar

The present research focuses on the first software to offer spatial autocorrelation and association measures, spatial exploratory tools, variography and Ordinary Kriging spatial interpolation in the World Wide Web. Exploiting IE® (Internet Explorer), ASP® (Active Server Pages), PHP® (Hypertext Preprocessor) and IIS® (Internet Information Server) capabilities, SAKWeb© (Spatial Autocorrelation and Kriging Web) was designed in an attractive and straightforward way for any GIS user. Hence, this chapter concentrates on the technical development and design of this Internet application. The differences between server and client side techniques are emphasized in the preamble section while the following one discusses the controversial debate between GIS (Geographical Information System) and SDSS (Spatial Decision Support System) concepts. The opening prospect given by the Internet platform is presented in section three. The next section fully reviews the main technological software used for its construction. References are made to their use within SAKWeb©. Some particular capabilities as an end-user were not forgotten, as well. The conclusion section leads to some future hints regarding its potential.


Sign in / Sign up

Export Citation Format

Share Document