Security user authentication procedures of web-applications
DOI:
https://doi.org/10.18372/2410-7840.16.6936Keywords:
Web-applications, authentication, attack, authentication process, information systemAbstract
Nowadays interactive Web-applications are an essentialpart of the information systems of business, governmentalstructures, etc. The main feature of such systems is toorganize the client access, business partners and employeesto the resources of the Internet. For access to onlineservices and defining the level of authority, users mustclearly identify themselves. There are many ways to organizethe process of users authentication; the mostcommon way is authentication with the help of forms. Inthis article the questions connected with increasing securityof the authentication process and control user sessionsare considered.References
Authentication and Session Management on the Web [Электронний ресурс] – Режим доступа. http://www.westpoint.ltd.uk/advisories/Paul_Johnston_GSEC.pdf свободный. – Загл. с экрана.
Коломыцев М.В. Анализ уязвимостей протоколов аутентификации WEB. [Текст]/ Коломыцев М.В., Носок С.А. // Захист інформації , НАУ, Киев, №3(50), 2012, с.41-45.
Web Authentication Security [Электронний ресурс] – Режим доступа. http://www.sans.org/ reading_room/whitepapers/webservers/web authentication-security_1250 свободный. – Загл. с экрана.
Аутентификация с помощью форм [Электронний ресурс] – Режим доступа. http://professorweb.ru/my/ASP_NET/security/level2/2_1.php свободный. –Загл. с экрана.
Дайджест аутентификация [Электронний ресурс] – Режим доступа. http://ru.wikipedia.org/wiki Дайджест_аутентификация свободный. – Загл. с экрана.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).