KONTROL AKSES DAN KEAMANAN DATA BAGI PENDUDUK MISKIN
Sari
ABSTRAK
Menetapkan role bagi pengguna yang melakukan pendataan atau pengguna tersebut seorang RT di gampong dan pengguna itu termasuk dalam kategori miskin, oleh sistem pengguna tersebut ditolak karena SSD hanya memperbolehkan satu role dimiliki oleh satu pengguna. Dengan menggunakan DSD dapat menyelesaikan permasalahan, tetapi hal tersebut akan mengalami kendala yang diakibatkan rawan terjadinya manipulasi. SOD digunakan untuk membatasi pengguna melakukan tugas-tugas tertentu sesuai ketentuan serta batasan yang diberikan oleh organisasi. SOD diimplementasikan pengguna melakukan tugas sesuai wewenang yang diberikan.
Kata Kunci: SSD, SOD, pengguna, role, membatasi, manipulasi
ABSTRACT
Assign roles for users to collect data on the user or a user households in the village and it was included in the category of the poor, by the user's system was rejected because SSD allowing only one owned by one user role. By using DSD can solve the problems, but it will run into obstacles caused prone to manipulation. SOD is used to restrict users to perform certain tasks according to the provisions and restrictions provided by the organization. SOD is implemented users perform tasks according to the authority given.Teks Lengkap:
PDFReferensi
Habib, M.A. 2011. Role inheritance with object-based DSD. Int. J. Internet Technology and Secured Transactions, 3, 2:149-160
Strembeck, M. 2004. Conflict Checking of Separation of Duty Constraints in RBAC - Implementation Experiences, In Proc. of the Conference on Software Engineering (SE)
Rotenberg, L.J. 1974. Making computers keep secrets. Ph.D. Th., MIT, MAC TR-115
Khayat. E.J., Abdallah. A. E. 2005. A Formal Model for Flat Role Based Access Control, IFIP International Federation for Information Processing Volume 173. pp 233-246
Roskos, J.E, Boone, J.M and Mayfield. T. 1989. Integrity in Tactical and Embedded Systems. Institute for Defense Analyses, HQ 89-034883/1
Hawkins, D.I, Best. R.J and Coney, K.A, 1983. Consumer Behavior, Business Publications, P lano, Texas
Ferraiolo, D, Kuhn. D, and Chandramouli, R., 2003, Role-Based Access Control, Artech House, Computer Security Series
DoD 5200.28-STD Department of Defense. 1985. Trusted Computer System Evaluation Criteria (Orange Book), National Computer Securit y Center
Refbacks
- Saat ini tidak ada refbacks.