Implementation of Modified MVC Model with Integrated Security in E-Procurement Application for Companies
Kata Kunci:
Authentication, E-Procurement, Model Modification, MVC, System SecurityAbstrak
This research discusses the implementation of a modified MVC (Model-View-Controller) model combined with advanced security features in an e-procurement application. The main objective of this study is to enhance both efficiency and security in the electronic procurement of goods and services. The proposed modification not only separates application logic, user interface, and database layers but also integrates critical security mechanisms, particularly in the areas of data validation, encryption, and user authentication. By applying these additional layers of protection, the system aims to minimise unauthorised access, prevent data breaches, and ensure the integrity of transactional information. The implementation results indicate that the developed e-procurement application is capable of accelerating transaction processes, maintaining data confidentiality, and significantly reducing the risk of system misuse or fraudulent activities. Furthermore, the approach supports compliance with best practices in secure software development. Therefore, the modified MVC model with integrated security features can be regarded as an effective and reliable solution to foster transparency, operational efficiency, and trustworthiness in modern electronic procurement systems.
Referensi
Astuti et al., 'E-Procurement Implementation,' Journal of Information Systems, 2023.
Ahmad et al., 'Objectives of E-Procurement,' International Journal of Technology, 2020.
Rahayu et al., 'E-Tendering and E-Bidding Systems,' Procedia Computer Science, 2022.
Mulyono, 'Benefits of E-Procurement,' Government Innovation Journal, 2019.
Rahmawati and Sumarsono, 'MVC Architecture in Web Applications,' International Journal of Computer Engineering, 2024.
Crumpler and Lewis, 'Authentication Weaknesses in Password Systems,' Cybersecurity Review, 2021.
Saputri and Bengkulu, 'Biometric Authentication Methods,' International Journal of Information Systems, 2023.
Miftahul Jannah et al., 'Biometric Authentication Security,' Journal of Network and Computing, 2024.
Utomo et al., 'Face Recognition Technology,' Procedia Computer Vision, 2020.
Wibowo et al., 'Feature Extraction for Face Recognition,' Journal of AI Research, 2024.
Ilham et al., 'Flowchart Analysis in Systems,' Journal of System Design, 2021.
Maulidyah and Darmojo, 'Use of UML in Web Development,' Journal of Software Engineering, 2021.
Endra et al., 'PHP and MySQL in Web Applications,' Journal of Computer Science, 2021.
Eyni Alfia and Waseso, 'MySQL for Relational Databases,' Journal of Information Technology, 2020.
Trigueros et al., 'CNN-based Face Recognition,' IEEE Transactions on Pattern Analysis, 2018.
Gururaj et al., 'Deep Learning in Biometric Systems,' ACM Computing Surveys, 2024.
Nurbaiti and Widhiantoro, 'LBPH in Face Recognition,' Journal of Computer Vision, 2024.
Purnama Sari et al., 'Laravel MVC in Web Apps,' International Journal of Web Engineering, 2019.
Mohseni et al., 'Feature Extraction in Face Recognition,' Springer, 2013.
Crumpler and Lewis, 'Comparative Study of Authentication,' Information Security Journal, 2021.
Gov Regulation, 'Procurement Transparency Law,' Government Regulation of Indonesia, 2012.
Vinayakumar et al., 'Intrusion Detection with Deep Learning,' IEEE Access, 2019.
Nguyen et al., 'Frameworks for Data Mining,' Artificial Intelligence Review, 2019.
Wu et al., 'Large-Scale Incremental Learning,' Proceedings of CVPR, 2019.
Shang and You, 'Data Analytics in Smart Manufacturing,' Engineering, 2019.
Unduhan
Diterbitkan
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2025 Journal of Technology and Computer

Artikel ini berlisensi Creative Commons Attribution 4.0 International License.