SISTEM KEAMANAN KONFIGURASI WEB MENGGUNAKAN REST API BERBASIS JWT HMAC SHA-512

The current development of WS is a trend, namely the transfer of state representation (break) and simple object access protocol (SOAP). The results of studies that have been created in mobile computing applications show that the size of messages in a quiet Web Service reaches nine to ten times small...

Volledige beschrijving

Bewaard in:
Bibliografische gegevens
Hoofdauteur: Rafi Fredy Septianto, (Auteur)
Formaat: Boek
Gepubliceerd in: 2021-07-15.
Onderwerpen:
Online toegang:Link Metadata
Tags: Voeg label toe
Geen labels, Wees de eerste die dit record labelt!

MARC

LEADER 00000 am a22000003u 4500
001 repoupnvj_17805
042 |a dc 
100 1 0 |a Rafi Fredy Septianto, .  |e author 
245 0 0 |a SISTEM KEAMANAN KONFIGURASI WEB MENGGUNAKAN REST API BERBASIS JWT HMAC SHA-512 
260 |c 2021-07-15. 
500 |a http://repository.upnvj.ac.id/17805/1/Abstrak.pdf 
500 |a http://repository.upnvj.ac.id/17805/2/Awal.pdf 
500 |a http://repository.upnvj.ac.id/17805/3/BAB%20I.pdf 
500 |a http://repository.upnvj.ac.id/17805/4/BAB%20II.pdf 
500 |a http://repository.upnvj.ac.id/17805/5/BAB%20III.pdf 
500 |a http://repository.upnvj.ac.id/17805/6/BAB%20IV.pdf 
500 |a http://repository.upnvj.ac.id/17805/7/BAB%20V.pdf 
500 |a http://repository.upnvj.ac.id/17805/8/Daftar%20Pustaka.pdf 
500 |a http://repository.upnvj.ac.id/17805/9/Riwayat%20Hidup.pdf 
500 |a http://repository.upnvj.ac.id/17805/10/Lampiran.pdf 
500 |a http://repository.upnvj.ac.id/17805/11/Artikel.pdf 
520 |a The current development of WS is a trend, namely the transfer of state representation (break) and simple object access protocol (SOAP). The results of studies that have been created in mobile computing applications show that the size of messages in a quiet Web Service reaches nine to ten times smaller than the size of SOAP-based WS messages. However, the REST is very low in terms of security. Securing RESTfulWS includes securing data and all communications to protect data confidentiality and integration. To work around this issue, the JSON Web Token (J WT) is used. This step was done in a previous study, which used JWT with the commonly used HMACSHA-256 algorithm, so that it could be a separate threat to security. The results of the study stated that the comparison of the implementation of SHA-256 and SHA-512 algorithms on 64-bit Intel architectures resulted in sha-512 performance 50% better than SHA-256. 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
690 |a Z719 Libraries (General) 
655 7 |a Thesis  |2 local 
655 7 |a NonPeerReviewed  |2 local 
787 0 |n http://repository.upnvj.ac.id/17805/ 
787 0 |n HTTP://repository.upnvj.ac.id 
856 4 1 |u http://repository.upnvj.ac.id/17805/  |z Link Metadata