{"created":"2020-09-01T09:48:32.985027+00:00","id":3234,"links":{},"metadata":{"_buckets":{"deposit":"6c01aa6e-63e5-4fb5-9016-74007e551706"},"_deposit":{"id":"3234","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3234"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3234","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Implementation of Discretionary Access Control and Role-Based Access Control Policy in Online Shopping System","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Today many business applications useDatabase System to maintain their businessinformation and many users access to Database toget information. The system need to create thesecurity principals for users to allow multipleaccesses to the database. The system needs torestrict or widen access to different parts of thedatabase and manipulate the permissions oraccess constraints of the database object. In thisthesis, Discretionary Access Control (DAC)method and Role-Based Access Control (RBAC)method are used to secure the database for onlineapplication system. These online systems also facemalicious users attack to the database server anddatabase variety of attacks.The proposed system intends to protect, someof these database attack using the role-basedaccess control for permission and access right onthe database is implemented for online shoppingsystem. The result of this approach enables usersto seamlessly, and transparently access from oneservice to another. The system is implemented byusing Microsoft Visual Studio ASP.Net and SQLserver 2005."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-19"}],"displaytype":"preview","filename":"130_PDFsam_PSC_final proof.pdf","filesize":[{"value":"137 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3234/files/130_PDFsam_PSC_final proof.pdf"},"version_id":"162afaf5-b68c-4965-848f-d91da7a6de03"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Eighth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Win, Khaing Zar"},{"subitem_authors_fullname":"Tun, Khin Mar Lar"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2017-12-27"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1004"},"item_title":"Implementation of Discretionary Access Control and Role-Based Access Control Policy in Online Shopping System","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-19","publish_status":"0","recid":"3234","relation_version_is_last":true,"title":["Implementation of Discretionary Access Control and Role-Based Access Control Policy in Online Shopping System"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T05:54:22.753535+00:00"}