GLOBAL PASSWORD FOR EASE OF USE, CONTROL AND SECURITY
Main Article Content
Abstract
Authentication is applied in information systems for maintaining the confidentiality and data security. Commonly used way is by giving a password. However, the authentication process as it may cause inconvenience for both users and administrators, ie if they are in environments that have many dijferent systems, where in each cf these systems implement an authentication process dijferent from one another. Through a global method of password, a user does not need to enter passwords repeatedly to enter into multiple systems at once. In addition, administrators also do not need to adjust the data in each database system in case a user changes to data. In this article, identified problems faced by the company in terms of authentication using passwords on web-based information systems, defined seven characteristics of the concept of a global method of authentication with a password as a troubleshooting step, and determined the benefits of mplementing these new concepts. In addition, the displayed listing program written using ASP script and its implementation on the Student Information Services (SIS) Online JRS in Higher Education Prog. In the global method of passwords, not only the security level is concerned, but also convenience and ease both in the process of using both at the time control.
Downloads
Article Details
References
2. Jogiyanto Hartono (2000). Pengenalan Komputer: Dasar Ilmu Komputer, Pemrograman, Sistem Informasi dan Intelegensi Buatan. Edisi ketiga. Yogyakarta: Andi.
3. Missa Lamsani (2009). Sistem Operasi Komputer: Keamanan Sistem. Diakses pada 5 Mei 2009 dari: http://missa.staff.gunadarma.ac.id/Downloads/files/6758/BAB8.pdf
4. Halga Tamici (2007). Analisa Kinerja Cryptography Secure Hash Standard pada Digital Signature Standard. Sekolah Teknik Elektro dan Informatika, Institut Teknologi Bandung. Ringkasan Makalah Diakses pada 5 maret 2010 dari : http://www.cert.or.id/~budi/courses/security/2007/Halga%20Proposal.pdf
5. Kodrat Iman Satoto, R. Rizal Isnanto, dan Ahmad Masykur (2009). Analisis