Pemetaan Subdomain Pada Cloud Server Universitas Semarang Menggunakan Metode Port Forwarding dan Reverse Proxy
Corresponding Author(s) : Mohammad Sani Suprayogi
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control,
Vol 2, No 1, February-2017
Abstract
Keywords
Download Citation
Endnote/Zotero/Mendeley (RIS)BibTeX
- H. S. Baginda Anggun Nan Cenka, Zainal A. Hasibuan, “The Architecture of Cloud Computing for Educational in Indonesia,” in Seminar Nasional Aplikasi Teknologi Informasi (SNATI), 2012.
- S. Zhang, S. Zhang, and X. Chen, “Cloud computing research and development trend,” in Future Networks, 2010. ICFN’10. Second International Conference, 2010, Pp. 93–97.
- M. SUPRAYOGI, T. Ashari, and M. Kom, “Implementasi Cloud Computing Menggunakan Model Adopsi Roadmap For Cloud Computing Adoption (ROCCA) Pada Institusi Pendidikan (Studi Kasus Universitas Semarang),” Universitas Gadjah Mada, Yogyakarta, 2014.
- A. Hamzah and I. Nugroho, “Studi Kasus Penerapan Roadmap For Cloud Computing Adoption (ROCCA) Pada Usaha Mikro Kecil Dan Menengah,” Universitas Gadjah Mada, 2012.
- A. Fardani and K. Surendro, “Strategi Adopsi Teknologi Informasi Berbasis Cloud Computing untuk Usaha Kecil dan Menengah di Indonesia,” in Seminar Nasional Aplikasi Teknologi Informasi (SNATI), 2011.
- R. Nimoko and I. Nugroho, “Kerangka Pemanfaatan Cloud Computing di Pemerintah Daerah,” Universitas Gadjah Mada, 2012.
- J. Postel, “DoD standard internet protocol,” 1980.
- Azis Senong, “Pengguna Internet di Indonesia 73 juta,” 2015. [Online]. Available: http://www.antaranews.com/berita/484406/pengguna-internet-di-indonesia-73-juta.
- R. Hinden and B. Haberman, “Unique local IPv6 unicast addresses,” 2005.
- G. Groot, Y. Rekhter, D. Karrenberg, and E. Lear, “Address Allocation for Private Internets,” 1996.
- S. Sirajuddin, A. Affandi, and E. Setijadi, “Rancang Bangun Server Learning Management System Menggunakan Load Balancer dan Reverse Proxy,” Jurnal Teknik ITS, pp. A50–A52, 2012.
- C. Lin, J. Liu, and C. Lien, “Detection Method Based On Reverse Proxy Against Web Flooding Attacks,” Intelligent Systems Design and Applications. ISDA '08. Eighth International Conference, pp. 281–284, 2008.
- Sean Wilkins, “Cisco’s PPDIOO Network Cycle,” 2011. [Online]. Available: http://www.ciscopress.com/articles/article.asp?p=1697888.
- R. Nimoko, “Kerangka Pemanfaatan Cloud Computing di Pemerintah Daerah,” Universitas Gadjah Mada, 2012.
- and S. C. H. Li, J. Sedayao, J. Hahn-Steichen, E. Jimison, C. Spence, “Developing an Enterprise Cloud computing Strategy,” 2009. [Online]. Available: http://www.intel.com/content/www/us/en/cloud-computing/software-as-a-service--saas-/intel-it-developing-cloud-computing-strategy-paper.html.
- Canonical, “Public or Private? Cloud Model Checklist,” 2012. [Online]. Available: http://insights.ubuntu.com/checklist/cloud-model-checklist/. [Accessed: 23-Sep-2013].
References
H. S. Baginda Anggun Nan Cenka, Zainal A. Hasibuan, “The Architecture of Cloud Computing for Educational in Indonesia,” in Seminar Nasional Aplikasi Teknologi Informasi (SNATI), 2012.
S. Zhang, S. Zhang, and X. Chen, “Cloud computing research and development trend,” in Future Networks, 2010. ICFN’10. Second International Conference, 2010, Pp. 93–97.
M. SUPRAYOGI, T. Ashari, and M. Kom, “Implementasi Cloud Computing Menggunakan Model Adopsi Roadmap For Cloud Computing Adoption (ROCCA) Pada Institusi Pendidikan (Studi Kasus Universitas Semarang),” Universitas Gadjah Mada, Yogyakarta, 2014.
A. Hamzah and I. Nugroho, “Studi Kasus Penerapan Roadmap For Cloud Computing Adoption (ROCCA) Pada Usaha Mikro Kecil Dan Menengah,” Universitas Gadjah Mada, 2012.
A. Fardani and K. Surendro, “Strategi Adopsi Teknologi Informasi Berbasis Cloud Computing untuk Usaha Kecil dan Menengah di Indonesia,” in Seminar Nasional Aplikasi Teknologi Informasi (SNATI), 2011.
R. Nimoko and I. Nugroho, “Kerangka Pemanfaatan Cloud Computing di Pemerintah Daerah,” Universitas Gadjah Mada, 2012.
J. Postel, “DoD standard internet protocol,” 1980.
Azis Senong, “Pengguna Internet di Indonesia 73 juta,” 2015. [Online]. Available: http://www.antaranews.com/berita/484406/pengguna-internet-di-indonesia-73-juta.
R. Hinden and B. Haberman, “Unique local IPv6 unicast addresses,” 2005.
G. Groot, Y. Rekhter, D. Karrenberg, and E. Lear, “Address Allocation for Private Internets,” 1996.
S. Sirajuddin, A. Affandi, and E. Setijadi, “Rancang Bangun Server Learning Management System Menggunakan Load Balancer dan Reverse Proxy,” Jurnal Teknik ITS, pp. A50–A52, 2012.
C. Lin, J. Liu, and C. Lien, “Detection Method Based On Reverse Proxy Against Web Flooding Attacks,” Intelligent Systems Design and Applications. ISDA '08. Eighth International Conference, pp. 281–284, 2008.
Sean Wilkins, “Cisco’s PPDIOO Network Cycle,” 2011. [Online]. Available: http://www.ciscopress.com/articles/article.asp?p=1697888.
R. Nimoko, “Kerangka Pemanfaatan Cloud Computing di Pemerintah Daerah,” Universitas Gadjah Mada, 2012.
and S. C. H. Li, J. Sedayao, J. Hahn-Steichen, E. Jimison, C. Spence, “Developing an Enterprise Cloud computing Strategy,” 2009. [Online]. Available: http://www.intel.com/content/www/us/en/cloud-computing/software-as-a-service--saas-/intel-it-developing-cloud-computing-strategy-paper.html.
Canonical, “Public or Private? Cloud Model Checklist,” 2012. [Online]. Available: http://insights.ubuntu.com/checklist/cloud-model-checklist/. [Accessed: 23-Sep-2013].