Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "a1efb806-ed5e-4a5c-abd0-4376886539be"}, "_deposit": {"id": "3244", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3244"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3244", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Implementation of Mandatory Access Control using Staff Levels", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Database security is the system, processes,and procedures that protect a database fromunintended activity. There are two type ofdatabase security, description access control(DAC) and Mandatory Access Control (MAC) alsocalled multi level security (MLS). This systemprovides a realization of mandatory access controlin an existing role-based security system bylabeling all users with clearances and all otherdata objects with classifications. The proposedsystem is intended to provide right access controlbased on user’s roles that are assigned accordingto the enterprise’s policy decision.In the system, the administrator can access alldata and can make all transactions of the wholesystem and the data occupation of the respectivelevel. The system users have project manager(level-4), assistant manager (level-3), team leader(level-2) and developer (level-1).These levels aredefined by the system administrator. User whoown right access account can manage data fromDatabase Server."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-19"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "141_PDFsam_PSC_final proof.pdf", "filesize": [{"value": "244 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 244000.0, "url": {"url": "https://meral.edu.mm/record/3244/files/141_PDFsam_PSC_final proof.pdf"}, "version_id": "06a4751a-addb-4974-ad5b-40689526cc71"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Eighth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Moe, Khin Myat"}, {"subitem_authors_fullname": "Myint, May Tar Hla"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2017-12-27"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1013"}, "item_title": "Implementation of Mandatory Access Control using Staff Levels", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003244", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-19"}, "publish_date": "2019-07-19", "publish_status": "0", "recid": "3244", "relation": {}, "relation_version_is_last": true, "title": ["Implementation of Mandatory Access Control using Staff Levels"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Implementation of Mandatory Access Control using Staff Levels

http://hdl.handle.net/20.500.12678/0000003244
http://hdl.handle.net/20.500.12678/0000003244
a37e09c9-cd57-475b-b3ca-4bd2c9cb06ff
a1efb806-ed5e-4a5c-abd0-4376886539be
None
Preview
Name / File License Actions
141_PDFsam_PSC_final 141_PDFsam_PSC_final proof.pdf (244 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 09:50:10.375031
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL