Pemantauan dan Pengaturan Proxy Server Dalam Pengaksesan Internet Dengan Otentikasi Berbasis Web

Authors

  • Januar Santoso Bina Nusantara University
  • Normandito Wijaya Bina Nusantara University
  • Khowi Siswandi Bina Nusantara University

DOI:

https://doi.org/10.21512/comtech.v1i2.2594

Keywords:

proxy server, authentication, web

Abstract

The quick expanding user of World Wide Web (WWW) has been made a development in proxy server in limited access to the users. Therefore, it needs the limit with designing and implementing proxy server configuration system and authentication in internet web-based usage so it will ease in supervising and using internet facility. The method used is analysis and web-based system design. The expected result is the easier in supervising and controlling internet facility using proxy server and reducing the leaking of internet facility usage through authentication (security).

 

Dimensions

Plum Analytics

References

Smith, L. D., Case, T. L. (1995). Managing Local Area Networks. New York: McGraw-Hill.

Fisher, C. (2000). Redhat Linux Administration Tools. New York: McGraw-Hill.

Lusignan, R.., Steudler, O., & Allison, J. (2000). Managing Cisco Network Security, Syngress.

Maiwald, E. (2004). Fundamentals of Network Security. McGraw-Hill Technology Education.

Maryanto, D. (2001). Buku Pintar Internet Optimasi Akses Internet dengan Squid. Jakarta: Elex Media Komputindo.

Vacca, J. R.. (2002). Wireless Data Demystified . McGraw-Hill Networking.

Subramanian, M. (2000). Network Management : Principles and Practise. Addison-Wesley.

Wessels, D. (2004). Squid: The Definitive Guide. O'Reilly

Downloads

Published

2010-12-01

Issue

Section

Articles
Abstract 345  .
PDF downloaded 373  .