GLOBAL PASSWORD FOR EASE OF USE, CONTROL AND SECURITY

Main Article Content

Untung Rahardja Valent Setiatmi Dhita Rukmianti

Abstract

Authentication is applied in information systems for maintaining the confidentiality and data security. Commonly used way is by giving a password. However, the authentication process as it may cause inconvenience for both users and administrators, ie if they are in environments that have many dijferent systems, where in each cf these systems implement an authentication process dijferent from one another. Through a global method of password, a user does not need to enter passwords repeatedly to enter into multiple systems at once. In addition, administrators also do not need to adjust the data in each database system in case a user changes to data. In this article, identified problems faced by the company in terms of authentication using passwords on web-based information systems, defined seven characteristics of the concept of a global method of authentication with a password as a troubleshooting step, and determined the benefits of  mplementing these new concepts. In addition, the displayed listing program written using ASP script and its implementation on the Student Information Services (SIS) Online JRS in Higher Education Prog. In the global method of passwords, not only the security level is concerned, but also convenience and ease both in the process of using both at the time control.

Downloads

Download data is not yet available.

Article Details

How to Cite
[1]
U. Rahardja, V. Setiatmi, and D. Rukmianti, “GLOBAL PASSWORD FOR EASE OF USE, CONTROL AND SECURITY”, CCIT (Creative Communication and Innovative Technology) Journal, vol. 3, no. 3, pp. 283-299, May 2010.
Section
Articles

References

1. Chandra Adhi W (2009). Identification and Authentication: Technology and Implementation Issues. Ringkasan Makalah. Diakses pada 4 Mei 2009 dari: http://bebas.vlsm.org/v06/Kuliah/Seminar-MIS/2008/254/254-08-Identification and Authentication.pdf
2. Jogiyanto Hartono (2000). Pengenalan Komputer: Dasar Ilmu Komputer, Pemrograman, Sistem Informasi dan Intelegensi Buatan. Edisi ketiga. Yogyakarta: Andi.
3. Missa Lamsani (2009). Sistem Operasi Komputer: Keamanan Sistem. Diakses pada 5 Mei 2009 dari: http://missa.staff.gunadarma.ac.id/Downloads/files/6758/BAB8.pdf
4. Halga Tamici (2007). Analisa Kinerja Cryptography Secure Hash Standard pada Digital Signature Standard. Sekolah Teknik Elektro dan Informatika, Institut Teknologi Bandung. Ringkasan Makalah Diakses pada 5 maret 2010 dari : http://www.cert.or.id/~budi/courses/security/2007/Halga%20Proposal.pdf
5. Kodrat Iman Satoto, R. Rizal Isnanto, dan Ahmad Masykur (2009). Analisis

Most read articles by the same author(s)

1 2 3 4 5 > >>