KONTROL AKSES DAN KEAMANAN DATA BAGI PENDUDUK MISKIN

Asrianda .

Sari


ABSTRAK

Menetapkan role bagi pengguna yang melakukan pendataan atau pengguna tersebut seorang RT di gampong  dan pengguna itu termasuk dalam kategori  miskin,  oleh  sistem pengguna  tersebut ditolak  karena SSD  hanya memperbolehkan satu role dimiliki oleh satu pengguna. Dengan menggunakan DSD dapat menyelesaikan permasalahan, tetapi hal tersebut akan mengalami kendala yang diakibatkan rawan terjadinya manipulasi. SOD digunakan  untuk membatasi pengguna melakukan tugas-tugas tertentu sesuai ketentuan serta  batasan  yang  diberikan  oleh  organisasi. SOD  diimplementasikan pengguna melakukan tugas sesuai wewenang yang diberikan.

 

Kata Kunci: SSD, SOD, pengguna, role, membatasi, manipulasi

 

 

ABSTRACT

Assign roles for users to collect data on the user or a user households in the village and it was included in the category of the poor, by the user's system was rejected because SSD allowing only one owned by one user role. By using DSD can solve the problems, but it will run into obstacles caused prone to manipulation. SOD is used to restrict users to perform certain tasks according to the provisions and restrictions provided by the organization. SOD is implemented users perform tasks according to the authority given.

Teks Lengkap:

PDF

Referensi


Habib, M.A. 2011. Role inheritance with object-based DSD. Int. J. Internet Technology and Secured Transactions, 3, 2:149-160

Strembeck, M. 2004. Conflict Checking of Separation of Duty Constraints in RBAC - Implementation Experiences, In Proc. of the Conference on Software Engineering (SE)

Rotenberg, L.J. 1974. Making computers keep secrets. Ph.D. Th., MIT, MAC TR-115

Khayat. E.J., Abdallah. A. E. 2005. A Formal Model for Flat Role Based Access Control, IFIP International Federation for Information Processing Volume 173. pp 233-246

Roskos, J.E, Boone, J.M and Mayfield. T. 1989. Integrity in Tactical and Embedded Systems. Institute for Defense Analyses, HQ 89-034883/1

Hawkins, D.I, Best. R.J and Coney, K.A, 1983. Consumer Behavior, Business Publications, P lano, Texas

Ferraiolo, D, Kuhn. D, and Chandramouli, R., 2003, Role-Based Access Control, Artech House, Computer Security Series

DoD 5200.28-STD Department of Defense. 1985. Trusted Computer System Evaluation Criteria (Orange Book), National Computer Securit y Center


Refbacks

  • Saat ini tidak ada refbacks.