{"created":"2020-09-01T13:39:48.142818+00:00","id":3849,"links":{},"metadata":{"_buckets":{"deposit":"c5244f7b-a554-4b1b-b336-27a14336c3e1"},"_deposit":{"id":"3849","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3849"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3849","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Payroll System Using Role-Based Access Control","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Security requirements approached at the enterprise level initiate the need for models that capture the organisational and distributed aspects of information usage. Such modifies have to express organization specific security policies and internal controls aiming to protect information against unauthorised access and modification, and against usage of information for unintended purposes. This system describes a systematic approach to model the security requirements from the perspective of job functions and tasks performed in an organization for the payroll system. The basis of access control policy in this system is to construct of a role. Roles are granted permissions according to the job functions that exist in an organisation, and then users are assigned to roles on basis of their specific job responsibilities. This paper intends for payroll system using Role-Based Access Control (RBAC). The central notion of role-based access control is that users do not have discretionary access control to enterprise objects."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Secure System"},{"interim":"Access Control"},{"interim":"Role based Access Control"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-08-01"}],"displaytype":"preview","filename":"55009.pdf","filesize":[{"value":"166 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3849/files/55009.pdf"},"version_id":"a67498bb-93dd-4bc7-b226-8ad6527e95c7"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fourth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Kyaw, May Phyu"},{"subitem_authors_fullname":"Yuzana"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-12-30"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1574"},"item_title":"Payroll System Using Role-Based Access Control","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-08-01","publish_status":"0","recid":"3849","relation_version_is_last":true,"title":["Payroll System Using Role-Based Access Control"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T00:49:33.477846+00:00"}