Analisis Implementasi Sistem Keamanan Basis Data Berbasis Role-Based Access Control (RBAC) pada Aplikasi Enterprise Resource Planning
DOI:
https://doi.org/10.54259/satesi.v5i1.3997Kata Kunci:
RBAC, Data Security, Access ManagementAbstrak
Role-Based Access Control (RBAC) telah menjadi pendekatan utama dalam meningkatkan keamanan data di berbagai sistem informasi. Penelitian ini menganalisis implementasi RBAC dalam konteks aplikasi Enterprise Resource Planning (ERP) dan sistem berbasis cloud, mobile, serta multi-domain. Dengan menggunakan metodologi systematic literature review (SLR), penelitian ini mensintesis temuan dari berbagai studi untuk mengevaluasi efektivitas RBAC dalam mengatasi tantangan seperti privasi data, kepatuhan regulasi, dan kompleksitas kebijakan akses. Hasil penelitian menunjukkan bahwa integrasi teknologi cerdas, seperti machine learning dan blockchain, dapat meningkatkan fleksibilitas dan efisiensi RBAC, terutama dalam mendeteksi anomali dan mengelola kebijakan dinamis. Selain itu, otomatisasi dalam penerapan RBAC terbukti mengurangi biaya operasional dan waktu pengelolaan. Namun, implementasi RBAC juga menghadapi tantangan signifikan, termasuk kebutuhan penyesuaian dengan regulasi yang kompleks dan dinamika lingkungan multi-domain. Penelitian ini memberikan kontribusi teoritis dengan memperluas pemahaman tentang peran RBAC dalam pengelolaan keamanan data modern dan menawarkan rekomendasi praktis untuk optimalisasi implementasi RBAC. Dengan demikian, RBAC terbukti sebagai model yang relevan dan dapat diandalkan dalam menjawab kebutuhan keamanan data di era digital.
Unduhan
Referensi
H. Alrasyid, I. Istianah, Z. E. Marpaung, A. Indrijawati, and M. Irdam, “Implementasi Sistem ERP terhadap Kinerja Bisnis: Pendekatan Literatur Review,” J. Real Ris., vol. 6, no. 1, pp. 54–66, 2024, doi: 10.47647/jrr.
Y. Yuricha and I. K. Phan, “Penerapan Role Based Access Control dalam Sistem Supply Chain Management Berbasis Cloud,” MALCOM Indones. J. Mach. Learn. Comput. Sci., vol. 3, no. 2, pp. 339–348, 2023, doi: 10.57152/malcom.v3i2.1259.
Y. A. Prasetia and D. Manongga, “Role-based access control (rbac) untuk sistem otorisasi terpusat berbasis flask studi kasus pt. xyz,” JIPI (Jurnal Ilm. Penelit. dan Pembelajaran Inform., vol. 9, no. 4, pp. 1768–1778, 2024.
M. Gratia, B. Sitorus, N. Maria, and Y. N. Safa, “Tinjauan Literatur Manajemen Risiko Cyber dalam Proyek : Identifikasi , Evaluasi , dan Mitigasi Ancaman,” J. Manaj. Inform., vol. 14, no. 2, pp. 187–198, 2024, doi: 10.34010/jamika.v14i2.12887.
M. Jafar, A. M. I. T. Asfar, and A. M. I. A. Asfar, “Artificial Intellegence Dalam Pendidikan Dan Penelitian: Tantangan Dan Solusi Menghadapinya,” Simp. Nas. Kepemimp. Perguru. Tinggi Indones., vol. 1, no. 2017, pp. 1–9, 2024.
H. Salsabila and I. P. Nasution, “ANALISIS DAMPAK REGULASI PRIVASI DATA TERHADAP MANAJEMEN KEMANAN DATA DI SEKTOR BISNIS,” Kinabalu, vol. 11, no. 2, pp. 50–57, 2013.
A. Purnomo, A. Kurniasih, A. Nuraminah, and S. Hartati, “Peran Artificial Intelligence dalam Deteksi Dini Ancaman Keamanan Jaringan,” J. Minfo Polgan, vol. 13, no. 2, pp. 2044–2048, 2024, doi: https://doi.org/10.33395/jmp.v13i2.14356 e-ISSN.
A. S. Khairi and M. Alda, “Implementasi Role Based Access Control dalam Pengelolaan Hak Akses Koperasi Berbasis Mobile,” Kec. Pancur Batu, Kab. Deli Serdang, vol. 120, p. 6615683, 2024.
T. Mehra, “The Critical Role of Role-Based Access Control (RBAC) in securing backup , recovery , and storage systems,” Int. J. Sci. Res. Arch., vol. 13, no. 1, pp. 1192–1194, 2024, doi: 10.30574/ijsra.2024.13.1.1733.
S. T. Alshammari, A. Albeshri, and K. Alsubhi, “Integrating a high‐reliability multicriteria trust evaluation model with task role‐based access control for cloud services,” Symmetry (Basel)., vol. 13, no. 3, 2021, doi: 10.3390/sym13030492.
A. M. Abdul et al., “Enhancing Security of Mobile Cloud Computing by Trust- and Role-Based Access Control,” Sci. Program., p. 10, 2022, doi: 10.1155/2022/9995023.
C. Blundo, S. Cimato, and L. Siniscalchi, “Managing Constraints in Role Based Access Control,” IEEE Access, vol. 8, pp. 140497–140511, 2020, doi: 10.1109/ACCESS.2020.3011310.
R. Ghazal, A. K. Malik, N. Qadeer, B. Raza, A. R. Shahid, and H. Alquhayz, “Intelligent Role-Based Access Control Model and Framework Using Semantic Business Roles in Multi-Domain Environments,” IEEE Access, vol. 8, pp. 12253–12267, 2020, doi: 10.1109/ACCESS.2020.2965333.
N. N. Thilakarathne and D. Wickramaaarachchi, “Improved hierarchical role based access control model for cloud computing,” Int. Res. Conf. Smart Comput. Syst. Eng., 2018.
A. U. R. Butt et al., “An Optimized Role-Based Access Control Using Trust Mechanism in E-Health Cloud Environment,” IEEE Access, vol. 11, no. November, pp. 138813–138826, 2023, doi: 10.1109/ACCESS.2023.3335984.
A. Walker, J. Svacina, J. Simmons, and T. Cerny, “On Automated Role-Based Access Control Assessment in Enterprise Systems,” Lect. Notes Electr. Eng., vol. 621, pp. 375–385, 2020, doi: 10.1007/978-981-15-1465-4_38.
A. Chatterjee, Y. Pitroda, and M. Parmar, “Dynamic Role-Based Access Control for Decentralized Applications,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 12404 LNCS, pp. 185–197, 2020, doi: 10.1007/978-3-030-59638-5_13.
E. Mpamugo and G. Ansa, “Enhancing Network Security in Mobile Applications with Role-Based Access Control,” J. Inf. Syst. Informatics, vol. 6, no. 3, pp. 1872–1899, 2024, doi: 10.51519/journalisi.v6i3.863.
I. G. Susrama, Sugiarto, and W. Agustiono, Buku Ajar Enterprise Resource Planning (ERP). 2021. [Online]. Available: https://www.researchgate.net/publication/358387687
V. F. Nahuway, “Manajemen Perkantoran Modern Di Era Digitalisasi: Suatu Tinjauan Literatur,” J. Adm. Terap., vol. 3, no. 1, pp. 303–315, 2024.
Unduhan
Diterbitkan
Cara Mengutip
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2025 M Sahyudi, Erliyan Redy Susanto

Artikel ini berlisensi Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).























