Professional Development Committee, Spring Technology Workshop
The Elements of Creating a Web PageHomePreviousNext

Introduction

Planning

Whole site design

Page design

Color and Graphics

Implementation

  • Web site setup
  • Tools
  • Security
  • Testing
  • Maintenance
  • User logs

    Promotion

    Innovation

    Site map


  • Implementation -- Security
    Will your Web site contain confidential documents? If yes, some form of access control will be necessary to insure such documents are served only to authorized users.

    Three types of access restriction
    1. Restriction by IP address, subnet, or domain
      Individual documents or whole directories are protected in such a way that only browsers connecting from certain IP (Internet) addresses, IP subnets, or domains can access them.
    2. Restriction by user name and password
      Documents or directories are protected so that the remote user has to provide a name and password in order to get access.
    3. Encryption using public key cryptography
      Both the request for the document and the document itself are encrypted in such a way that the text cannot be read by anyone but the intended recipient. Public key cryptography can also be used for reliable user verification. See below.

    The World Wide Web Security FAQ
    http://www.w3.org/Security/Faq/www-security-faq.html


    Comments? Contact:
    Scott Britton, or
    Martin Hollick, or
    Julie Wetherill
    Copyright 1997, Harvard University. All rights reserved. Revised March 1998TopPreviousNext