{"http:\/\/lib.itenas.ac.id\/kti\/?p=2015":{"http:\/\/www.w3.org\/1999\/02\/22-rdf-syntax-ns#type":[{"type":"uri","value":"http:\/\/rdfs.org\/sioc\/ns#Post"},{"type":"uri","value":"http:\/\/rdfs.org\/sioc\/types#BlogPost"}],"http:\/\/purl.org\/dc\/elements\/1.1\/title":[{"type":"literal","value":"DEVELOPMENT OF WEB-BASED APPLICATION WITH WEB ENGINEERING SECURITY (WES) METHODOLOGY FOR SECURITY ASPECT ENHANCEMENT (CASE STUDY : WEB-BASED SIMAk MM UNPAD APPLICATION)"}],"http:\/\/purl.org\/dc\/terms\/identifier":[{"type":"literal","value":"2015","datatype":"http:\/\/www.w3.org\/2001\/XMLSchema#integer"}],"http:\/\/purl.org\/dc\/elements\/1.1\/modified":[{"type":"literal","value":"2013-10-09","datatype":"http:\/\/www.w3.org\/2001\/XMLSchema#date"}],"http:\/\/purl.org\/dc\/elements\/1.1\/created":[{"type":"literal","value":"2013-10-08","datatype":"http:\/\/www.w3.org\/2001\/XMLSchema#date"}],"http:\/\/rdfs.org\/sioc\/ns#link":[{"type":"uri","value":"https:\/\/lib.itenas.ac.id\/kti\/?p=2015"}],"http:\/\/rdfs.org\/sioc\/ns#has_creator":[{"type":"uri","value":"https:\/\/lib.itenas.ac.id\/kti\/?author=6#account"}],"http:\/\/rdfs.org\/sioc\/ns#has_container":[{"type":"uri","value":"https:\/\/lib.itenas.ac.id\/kti\/#posts"}],"http:\/\/purl.org\/dc\/elements\/1.1\/abstract":[{"type":"literal","value":""}],"http:\/\/purl.org\/rss\/1.0\/modules\/content\/encoded":[{"type":"literal","value":"<![CDATA[SIMAk MM UNPAD is a web-based application that manages the academic information on The \u00a0Masters of Management Program of Padjadjaran University. Therefore, the application stores a lot of important academic data that some of them are sensitive and confidential. This causes the security aspects becomes a major \u00a0oncern in the application development so that the stored data can be properly maintained, disbibuted and utilized. Web Engineering Security (WES) is a methodology in developing an application that focuses on security aspects. WES is a proactive, flexible, process neutral security methodology with customizable components that is based on empirical evidence and used to explicitly integrate security throughout an application development process. The implementation of WES methodology could assist the development of SIMAk MM UNPAD in identifying risk of threats that can attack a web-based application such as SQL Injection and Cross Site Scripting (XSS) and provide guidance in terms of data distribution that occured in the application according to the needsof end-user.\r\n\r\nDibuat oleh : \u00a0Dewi Rosmala, S.Si.,M.IT.,\u00a0Gema Ananda\r\n\r\nE-mail:\u00a0d_rosmala@itenas.ac.id\r\n\r\nKata kunci :\u00a0SIMAk MM UNPAD, WES, web, PHP, sql injection, cross site scripting.\r\n\r\nKeterangan : \u00a0Makalah ini \u00a0dimuat pada \u00a0<span style=\"direction: ltr;\">PROCEEDINGS\u00a0<\/span><span style=\"direction: ltr;\">KONFERENSI NASIONAL SISTEM INFORMASI (KNSI)2013<\/span>\r\n\r\n<a href=\"http:\/\/lib.itenas.ac.id\/kti\/wp-content\/uploads\/2013\/10\/Proceeding-KNSI.pdf\">DEVELOPMENT OF WEB-BASED APPLICATION WITH WEB ENGINEERING SECURITY (WES) METHODOLOGY FOR SECURITY ASPECT ENHANCEMENT<\/a>\u00a0<a href=\"http:\/\/lib.itenas.ac.id\/kti\/wp-content\/uploads\/2013\/10\/Proceeding-KNSI.pdf\">(CASE STUDY : WEB-BASED SIMAk MM UNPAD APPLICATION)<\/a>]]>","datatype":"http:\/\/www.w3.org\/1999\/02\/22-rdf-syntax-ns#XMLLiteral"}],"http:\/\/rdfs.org\/sioc\/ns#content":[{"type":"literal","value":"SIMAk MM UNPAD is a web-based application that manages the academic information on The \u00a0Masters of Management Program of Padjadjaran University. Therefore, the application stores a lot of important academic data that some of them are sensitive and confidential. This causes the security aspects becomes a major \u00a0oncern in the application development so that the stored data can be properly maintained, disbibuted and utilized. Web Engineering Security (WES) is a methodology in developing an application that focuses on security aspects. WES is a proactive, flexible, process neutral security methodology with customizable components that is based on empirical evidence and used to explicitly integrate security throughout an application development process. The implementation of WES methodology could assist the development of SIMAk MM UNPAD in identifying risk of threats that can attack a web-based application such as SQL Injection and Cross Site Scripting (XSS) and provide guidance in terms of data distribution that occured in the application according to the needsof end-user.\r\n\r\nDibuat oleh : \u00a0Dewi Rosmala, S.Si.,M.IT.,\u00a0Gema Ananda\r\n\r\nE-mail:\u00a0d_rosmala@itenas.ac.id\r\n\r\nKata kunci :\u00a0SIMAk MM UNPAD, WES, web, PHP, sql injection, cross site scripting.\r\n\r\nKeterangan : \u00a0Makalah ini \u00a0dimuat pada \u00a0PROCEEDINGS\u00a0KONFERENSI NASIONAL SISTEM INFORMASI (KNSI)2013\r\n\r\nDEVELOPMENT OF WEB-BASED APPLICATION WITH WEB ENGINEERING SECURITY (WES) METHODOLOGY FOR SECURITY ASPECT ENHANCEMENT\u00a0(CASE STUDY : WEB-BASED SIMAk MM UNPAD APPLICATION)"}],"http:\/\/rdfs.org\/sioc\/ns#topic":[{"type":"uri","value":"https:\/\/lib.itenas.ac.id\/kti\/?cat=1"},{"type":"uri","value":"https:\/\/lib.itenas.ac.id\/kti\/?cat=7"},{"type":"uri","value":"https:\/\/lib.itenas.ac.id\/kti\/?tag=cross-site-scripting"},{"type":"uri","value":"https:\/\/lib.itenas.ac.id\/kti\/?tag=php"},{"type":"uri","value":"https:\/\/lib.itenas.ac.id\/kti\/?tag=simak-mm-unpad"},{"type":"uri","value":"https:\/\/lib.itenas.ac.id\/kti\/?tag=sql-injection"},{"type":"uri","value":"https:\/\/lib.itenas.ac.id\/kti\/?tag=web"},{"type":"uri","value":"https:\/\/lib.itenas.ac.id\/kti\/?tag=wes"}],"http:\/\/rdfs.org\/sioc\/ns#attachment":[{"type":"uri","value":"http:\/\/lib.itenas.ac.id\/kti\/wp-content\/uploads\/2013\/10\/Proceeding-KNSI.pdf"}]},"https:\/\/lib.itenas.ac.id\/kti\/?author=6#account":{"http:\/\/www.w3.org\/2000\/01\/rdf-schema#seeAlso":[{"type":"uri","value":"https:\/\/lib.itenas.ac.id\/kti\/?author=6&feed=lhrdf&format=json"}]},"https:\/\/lib.itenas.ac.id\/kti\/?cat=1":{"http:\/\/www.w3.org\/2000\/01\/rdf-schema#seeAlso":[{"type":"uri","value":"https:\/\/lib.itenas.ac.id\/kti\/?cat=1&feed=lhrdf&format=json"}]},"https:\/\/lib.itenas.ac.id\/kti\/?cat=7":{"http:\/\/www.w3.org\/2000\/01\/rdf-schema#seeAlso":[{"type":"uri","value":"https:\/\/lib.itenas.ac.id\/kti\/?cat=7&feed=lhrdf&format=json"}]},"https:\/\/lib.itenas.ac.id\/kti\/?tag=cross-site-scripting":{"http:\/\/www.w3.org\/2000\/01\/rdf-schema#seeAlso":[{"type":"uri","value":"https:\/\/lib.itenas.ac.id\/kti\/?tag=cross-site-scripting&feed=lhrdf&format=json"}]},"https:\/\/lib.itenas.ac.id\/kti\/?tag=php":{"http:\/\/www.w3.org\/2000\/01\/rdf-schema#seeAlso":[{"type":"uri","value":"https:\/\/lib.itenas.ac.id\/kti\/?tag=php&feed=lhrdf&format=json"}]},"https:\/\/lib.itenas.ac.id\/kti\/?tag=simak-mm-unpad":{"http:\/\/www.w3.org\/2000\/01\/rdf-schema#seeAlso":[{"type":"uri","value":"https:\/\/lib.itenas.ac.id\/kti\/?tag=simak-mm-unpad&feed=lhrdf&format=json"}]},"https:\/\/lib.itenas.ac.id\/kti\/?tag=sql-injection":{"http:\/\/www.w3.org\/2000\/01\/rdf-schema#seeAlso":[{"type":"uri","value":"https:\/\/lib.itenas.ac.id\/kti\/?tag=sql-injection&feed=lhrdf&format=json"}]},"https:\/\/lib.itenas.ac.id\/kti\/?tag=web":{"http:\/\/www.w3.org\/2000\/01\/rdf-schema#seeAlso":[{"type":"uri","value":"https:\/\/lib.itenas.ac.id\/kti\/?tag=web&feed=lhrdf&format=json"}]},"https:\/\/lib.itenas.ac.id\/kti\/?tag=wes":{"http:\/\/www.w3.org\/2000\/01\/rdf-schema#seeAlso":[{"type":"uri","value":"https:\/\/lib.itenas.ac.id\/kti\/?tag=wes&feed=lhrdf&format=json"}]},"http:\/\/lib.itenas.ac.id\/kti\/wp-content\/uploads\/2013\/10\/Proceeding-KNSI.pdf":{"http:\/\/www.w3.org\/2000\/01\/rdf-schema#seeAlso":[{"type":"uri","value":"https:\/\/lib.itenas.ac.id\/kti\/?attachment_id=2016&feed=lhrdf&format=json"}]}}