MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "c5244f7b-a554-4b1b-b336-27a14336c3e1"}, "_deposit": {"id": "3849", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3849"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3849", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Payroll System Using Role-Based Access Control", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Security requirements approached at the enterprise level initiate the need for models that capture the organisational and distributed aspects of information usage. Such modifies have to express organization specific security policies and internal controls aiming to protect information against unauthorised access and modification, and against usage of information for unintended purposes. This system describes a systematic approach to model the security requirements from the perspective of job functions and tasks performed in an organization for the payroll system. The basis of access control policy in this system is to construct of a role. Roles are granted permissions according to the job functions that exist in an organisation, and then users are assigned to roles on basis of their specific job responsibilities. This paper intends for payroll system using Role-Based Access Control (RBAC). The central notion of role-based access control is that users do not have discretionary access control to enterprise objects."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Secure System"}, {"interim": "Access Control"}, {"interim": "Role based Access Control"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-08-01"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "55009.pdf", "filesize": [{"value": "166 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 166000.0, "url": {"url": "https://meral.edu.mm/record/3849/files/55009.pdf"}, "version_id": "a67498bb-93dd-4bc7-b226-8ad6527e95c7"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Kyaw, May Phyu"}, {"subitem_authors_fullname": "Yuzana"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1574"}, "item_title": "Payroll System Using Role-Based Access Control", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003849", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-01"}, "publish_date": "2019-08-01", "publish_status": "0", "recid": "3849", "relation": {}, "relation_version_is_last": true, "title": ["Payroll System Using Role-Based Access Control"], "weko_shared_id": -1}
Payroll System Using Role-Based Access Control
http://hdl.handle.net/20.500.12678/0000003849
http://hdl.handle.net/20.500.12678/0000003849b61f7cfa-3bed-4b35-ba01-d11ceaa67ed7
c5244f7b-a554-4b1b-b336-27a14336c3e1
Name / File | License | Actions |
---|---|---|
![]() |
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Payroll System Using Role-Based Access Control | |||||
Language | en | |||||
Publication date | 2009-12-30 | |||||
Authors | ||||||
Kyaw, May Phyu | ||||||
Yuzana | ||||||
Description | ||||||
Security requirements approached at the enterprise level initiate the need for models that capture the organisational and distributed aspects of information usage. Such modifies have to express organization specific security policies and internal controls aiming to protect information against unauthorised access and modification, and against usage of information for unintended purposes. This system describes a systematic approach to model the security requirements from the perspective of job functions and tasks performed in an organization for the payroll system. The basis of access control policy in this system is to construct of a role. Roles are granted permissions according to the job functions that exist in an organisation, and then users are assigned to roles on basis of their specific job responsibilities. This paper intends for payroll system using Role-Based Access Control (RBAC). The central notion of role-based access control is that users do not have discretionary access control to enterprise objects. | ||||||
Keywords | ||||||
Secure System, Access Control, Role based Access Control | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/1574 | |||||
Journal articles | ||||||
Fourth Local Conference on Parallel and Soft Computing | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |