Design and development of Capture the Flag game server for competitions in information security
Prikladnaâ diskretnaâ matematika, no. 12 (2010), pp. 62-64.

Voir la notice de l'article provenant de la source Math-Net.Ru

The game server for Capture the Flag information security contests is introduced. It is based on rules proposed by SiBears team from Tomsk State University. Teams are isolated from each other most of the time and each team should earn the ability to attack another team. The game server is designed as implementation of Model-View-Controller pattern with Model being implemented as Object-Relationship Mapping, the Controller being implemented as the set of CGI-scripts for web-server and View – as translation from XML to XHTML with XSLT technology.
@article{PDM_2010_12_a29,
     author = {N. O. Tkachenko and D. V. Chernov},
     title = {Design and development of {Capture} the {Flag} game server for competitions in information security},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {62--64},
     publisher = {mathdoc},
     number = {12},
     year = {2010},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2010_12_a29/}
}
TY  - JOUR
AU  - N. O. Tkachenko
AU  - D. V. Chernov
TI  - Design and development of Capture the Flag game server for competitions in information security
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2010
SP  - 62
EP  - 64
IS  - 12
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2010_12_a29/
LA  - ru
ID  - PDM_2010_12_a29
ER  - 
%0 Journal Article
%A N. O. Tkachenko
%A D. V. Chernov
%T Design and development of Capture the Flag game server for competitions in information security
%J Prikladnaâ diskretnaâ matematika
%D 2010
%P 62-64
%N 12
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2010_12_a29/
%G ru
%F PDM_2010_12_a29
N. O. Tkachenko; D. V. Chernov. Design and development of Capture the Flag game server for competitions in information security. Prikladnaâ diskretnaâ matematika, no. 12 (2010), pp. 62-64. http://geodesic.mathdoc.fr/item/PDM_2010_12_a29/

[1] Kolegov D. N., Chernushenko Yu. N., “O sorevnovaniyakh CTF po kompyuternoi bezopasnosti”, Prikladnaya diskretnaya matematika, 2008, no. 2(2), 81–83

[2] Komanda SiBears, Elektron. dan. Svobodnyi rezhim dostupa: , Tomskii gosudarstvennyi universitet, 2010 http://sibears.ru

[3] Reenskaug T., The Model-View-Controller (MVC) in past and present, Elektron. dan. Svobodnyi rezhim dostupa: , University of Oslo, 2003 http://heim.ifi.uio.no/~trygver/ 2003/javazone-jaoo/MVC_pattern.pdf

[4] Ambler S., Agile database techniques: effective strategies for the agile software developer, Wiley, 2003, 480 pp.