Security user authentication procedures of web-applications
DOI:
https://doi.org/10.18372/2410-7840.16.6936Keywords:
Web-applications, authentication, attack, authentication process, information systemAbstract
Nowadays interactive Web-applications are an essentialpart of the information systems of business, governmentalstructures, etc. The main feature of such systems is toorganize the client access, business partners and employeesto the resources of the Internet. For access to onlineservices and defining the level of authority, users mustclearly identify themselves. There are many ways to organizethe process of users authentication; the mostcommon way is authentication with the help of forms. Inthis article the questions connected with increasing securityof the authentication process and control user sessionsare considered.References
Authentication and Session Management on the Web [Электронний ресурс] – Режим доступа. http://www.westpoint.ltd.uk/advisories/Paul_Johnston_GSEC.pdf свободный. – Загл. с экрана.
Коломыцев М.В. Анализ уязвимостей протоколов аутентификации WEB. [Текст]/ Коломыцев М.В., Носок С.А. // Захист інформації , НАУ, Киев, №3(50), 2012, с.41-45.
Web Authentication Security [Электронний ресурс] – Режим доступа. http://www.sans.org/ reading_room/whitepapers/webservers/web authentication-security_1250 свободный. – Загл. с экрана.
Аутентификация с помощью форм [Электронний ресурс] – Режим доступа. http://professorweb.ru/my/ASP_NET/security/level2/2_1.php свободный. –Загл. с экрана.
Дайджест аутентификация [Электронний ресурс] – Режим доступа. http://ru.wikipedia.org/wiki Дайджест_аутентификация свободный. – Загл. с экрана.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal adheres to the principles of Open Access and provides free, immediate, and permanent access to all published materials without financial, technical, or legal barriers for readers.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.