ROLE-BASED ACCESS CONTROL (RBAC) UNTUK SISTEM OTORISASI TERPUSAT BERBASIS FLASK STUDI KASUS PT. XYZ
Abstract
Keywords
Full Text:
PDFArticle Metrics :
References
H. Madiistriyatno, “Pengamanan Pengelolaan Hak Akses Web Berbasis Yii Framework,” Syntax J. Inform., vol. 7, no. 1, pp. 52–63, 2018.
M. K. Kabier, A. A. Yassin, Z. A. Abduljabbar, and S. Lu, “Role Based Access Control Using Biometric the in Educational System,” Basrah Res. Sci., vol. 49, no. 1, pp. 85–101, 2023, doi: 10.56714/bjrs.49.1.8.
J. Barkley, A. Cincotta, D. Ferraiolo, S. Gavrila, and R. Kuhn, “Role Based Access for the World Wide Web,” Natl. Inf. Syst. Secur. Conf., no. September 2014, 1997.
B. Jayant.D, U. Swapnaja A, A. Sulabha S, and M. Dattatray G, “Analysis of DAC MAC RBAC Access Control based Models for Security,” Int. J. Comput. Appl., vol. 104, no. 5, pp. 6–13, 2014, doi: 10.5120/18196-9115.
J. Zhao and J. Sun, “Research on Access Control Model Based on RBAC Model in Microservice Environment,” J. Phys. Conf. Ser., vol. 1437, no. 1, 2020, doi: 10.1088/1742-6596/1437/1/012031.
M. U. Aftab, A. Nisar, M. Asif, A. Ashraf, and B. Gill, “RBAC architecture design issues in institutions collaborative environment,” Int. J. Comput. Sci. Issues, vol. 10, no. 4, pp. 216–221, 2013.
Rubiyanto, Selo, and Widyawan, “Implementasi Role-Based Access Control (Rbac) Pada Pemanfaatan Data Kependudukan Ditingkat Kabupaten,” Poster 021, no. November, pp. 1–10, 2017.
L. Dongdong, X. Shiliang, Z. Yan, T. Fuxiao, N. Lei, and Z. Jia, “Role-based access control in educational administration system,” MATEC Web Conf., vol. 139, pp. 1–8, 2017, doi: 10.1051/matecconf/201713900120.
D. Ghimire, “Comparative study on Python web frameworks: Flask and Django,” Metrop. Univ. Appl. Sci., no. May, pp. 13–33, 2020, [Online]. Available: https://urn.fi/URN:NBN:fi:amk-2020052513398
A. Sasturkar, P. Yang, S. D. Stoller, and C. R. Ramakrishnan, “Policy analysis for Administrative Role-Based Access Control,” Theor. Comput. Sci., vol. 412, no. 44, pp. 6208–6234, 2011, doi: 10.1016/j.tcs.2011.05.009.
K. ’Afiifah, Z. F. Azzahra, and A. D. Anggoro, “Analisis Teknik Entity-Relationship Diagram dalam Perancangan Database Sebuah Literature Review,” Intech, vol. 3, no. 2, pp. 18–22, 2022, doi: 10.54895/intech.v3i2.1682.
D. F. Ferraiolo, J. F. Barkley, and D. R. Kuhn, “A role-based access control model and reference implementation within a corporate intranet,” ACM Trans. Inf. Syst. Secur., vol. 2, no. 1, pp. 34–64, 1999, doi: 10.1145/300830.300834.
S. Osborn, R. Sandhu, and Q. Munawer, “Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies,” ACM Trans. Inf. Syst. Secur., vol. 3, no. 2, pp. 85–106, 2000, doi: 10.1145/354876.354878.
S. M. Pulungan, R. Febrianti, T. Lestari, N. Gurning, and N. Fitriana, “Analisis Teknik Entity-Relationship Diagram Dalam Perancangan Database,” J. Ekon. Manaj. dan Bisnis, vol. 1, no. 2, pp. 98–102, 2023, doi: 10.47233/jemb.v1i2.533.
MUDZAKKIR TOHA, “IMPLEMENTASI FRAMEWORK SPRING MVC UNTUK PEMBUATAN SISTEM INFORMASI MANAJEMEN E COMMERCE TUGAS,” Int. J. Dev. Manag. Rev., vol. 5, no. 1, pp. 212–224, 2010, [Online]. Available: http://publications.lib.chalmers.se/records/fulltext/245180/245180.pdf%0Ahttps://hdl.handle.net/20.500.12380/245180%0Ahttp://dx.doi.org/10.1016/j.jsames.2011.03.003%0Ahttps://doi.org/10.1016/j.gr.2017.08.001%0Ahttp://dx.doi.org/10.1016/j.precamres.2014.12
B. Shaik and D. K. Chemuduru, “PL/pgSQL Essential Extensions BT - Procedural Programming with PostgreSQL PL/pgSQL: Design Complex Database-Centric Applications with PL/pgSQL,” B. Shaik and D. K. Chemuduru, Eds., Berkeley, CA: Apress, 2023, pp. 293–309. doi: 10.1007/978-1-4842-9840-4_19.
A. A. Wibowo Putri and Y. A. Susetyo, “Implementation of Flask for Stock Checking in Distribution Center & Store on Monitoring Stock Application in Pt. Xyz,” J. Tek. Inform., vol. 3, no. 5, pp. 1265–1274, 2022, doi: 10.20884/1.jutif.2022.3.5.334.
S. Vivian and H. S. Rismon, “Pemrograman Web dengan PHP dan MySQL - Google Books,” Penerbit SPARTA, no. January 2005, pp. 1–122, 2018.
A. N. Hasibuan and T. Dirgahayu, “Pengujian dengan Unit Testing dan Test case pada Proyek Pengembangan Modul Manajemen Pengguna,” J. Inform. Univ. Islam Indones., vol. 2, no. 1, pp. 103–109, 2020.
X. Jin, R. Krishnan, and R. Sandhu, “A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC BT - Lecture Notes in Computer Science,” Lect. Notes Comput. Sci., vol. 7371, no. Chapter 4, pp. 41–55, 2012, [Online]. Available: http://dx.doi.org/10.1007/978-3-642-31540-4_4%5Cnpapers2://publication/doi/10.1007/978-3-642-31540-4_4