The implementation of the DBMS credentials protection method in the web applications
Prikladnaâ diskretnaâ matematika, no. 3 (2009), pp. 100-105
The paper considers the peculiarities of authentication in multi-tier environment and corresponding security problems. The protection method for DBMS credentials is provided. The ways for the implementation of the method using PHP programming language are considered.
@article{PDM_2009_3_a10,
author = {P. A. Pautov},
title = {The implementation of the {DBMS} credentials protection method in the web applications},
journal = {Prikladna\^a diskretna\^a matematika},
pages = {100--105},
year = {2009},
number = {3},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/PDM_2009_3_a10/}
}
P. A. Pautov. The implementation of the DBMS credentials protection method in the web applications. Prikladnaâ diskretnaâ matematika, no. 3 (2009), pp. 100-105. http://geodesic.mathdoc.fr/item/PDM_2009_3_a10/
[1] Pautov P. A., “Problema autentifikatsii v mnogourovnevykh prilozheniyakh”, Prikladnaya diskretnaya matematika, 2008, no. 2, 87–90
[2] Pautov P. A., “Realizatsiya metoda zaschity autentifikatsionnykh dannykh v mnogourovnevykh prilozheniyakh”, Prikladnaya diskretnaya matematika, Prilozhenie, No 1 (2009), 50–51
[3] Vikipediya , 2009 www.wikipedia.org
[4] Rukovodstvo po installyatsii “1S-Bitriks: Upravlenie saitom 6.xx”, , 2007 www.1c-bitrix.ru
[5] Karakas C., Erba C., PHP-Nuke: Management and Programming, , 2005 www.karakas-online.de/EN-Book
[6] , 2009 www.masterhost.ru
[7] , 2009 www.peterhost.ru
[8] Olson P., PHP Manual, , 2009 www.php.net/manual