Sistem Keamanan Berlapis Menggunakan Metode Access Control List Dan Enkripsi Source Code Pada Web Login
Abstract
Web documents are the most important assets for organizations to represent reports managed by servers. Meanwhile, the form is the entrance for the input provided by the user to be able to take advantage of server resources, be it a database, or other features that are owned by the server. This research focuses on the security of the web login form which is the entry point for various users. The level of authority (authorization) of users is set based on the Access Control List (ACL) which is arranged in such a way by the administrator. Multi-layered security goes through several stages that must be passed by the user, from validation, verification, authentication to authorizing according to the rights given to him by the administrator. The results found provide more value for web developers to set a standard security system for the web login form they build. However, various other security opportunities may be found in subsequent research, as developments
References
Davies, J.N., Comerford, P., Grout, V., Davies, J.N., Comerford, P., Grout, V., 2012. Principles of Eliminating Access Control Lists within a Domain. Future Internet 4, 413–429. https://doi.org/10.3390/fi4020413
J. Radianti, 2010. In Proceedings of the 4th International Conference on Emerging Security Information Systems and Technologies (SECURWARE), Eliciting information on the vulnerability black market from interviews. Vanice, Italy.
Kaczmarczyk, V., Bradáč, Z., Fiedler, P., Arm, J., 2016. Client side data encryption/decryption for web application. IFAC-Pap., 14th IFAC Conference on Programmable Devices and Embedded Systems PDES 2016 49, 241–246. https://doi.org/10.1016/j.ifacol.2016.12.041
S. Frei, D. Schatzmann, B. Plattner, B. Trammell, 2010. Economics of Information Security and Privacy, Modeling the security ecosystem - The dynamics of (In)Security. Springer Verlag.
SmartGb, S., 2018. Encrypt HTML. SmartGb.
Tommi Tulisalo, Rune Carlsen, Andre Guirard, Pekka Hartikainen, Grant McCarthy, Gustavo Pecly, 2002. Domino Designer 6: A Developer’s Handbook [Book] [WWW Document]. URL https://www.safaribooksonline.com/library/view/domino-designer-6/073842658X/ (accessed 9.5.18).
Zhao, M., Grossklags, J., Chen, K., 2014. An Exploratory Study of White Hat Behaviors in a Web Vulnerability Disclosure Program, in: Proceedings of the 2014 ACM Workshop on Security Information Workers, SIW ’14. ACM, New York, NY, USA, pp. 51–58. https://doi.org/10.1145/2663887.2663906
Copyright (c) 2021 JUTECH

This work is licensed under a Creative Commons Attribution 4.0 International License.