Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "878e4d59-964a-48c3-b94d-cd2954bbf2f5"}, "_deposit": {"id": "4877", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4877"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4877", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "RDB-XML Security Model based on Masked Relations", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Relational databases get more and more employed in order to store the contents of a web site. At the same time, XML is a fast emerging technology, which is the standard of data exchange over the web and due to the new requirements emerging from several applications there is a great need for the integration between XML and Database technology. Moreover, Security is becoming one of the most urgent challenges in database research and industry, and the challenge is intensifying due to the enormous popularity of web-based applications. There are a lot of researches about security for XML databases or relational databases, but the researches do not consider the fact that integrated RDB-XML system to publish XML data reside in relational database. This paper explores security techniques for proposed security model in which secure data stored in relational database, access controls for XML data are also specified in relational model, secure key scheme and secure data transfer as a XML document."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-11"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "11077.pdf", "filesize": [{"value": "216 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 216000.0, "url": {"url": "https://meral.edu.mm/record/4877/files/11077.pdf"}, "version_id": "7bfd698b-e0b8-417f-aacb-f42a563e8681"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Eleventh International Conference On Computer Applications (ICCA 2013)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Kham, Nang Saing Moon"}, {"subitem_authors_fullname": "Thin, Lwin Mar"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2013-02-26"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/772"}, "item_title": "RDB-XML Security Model based on Masked Relations", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004877", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-11"}, "publish_date": "2019-07-11", "publish_status": "0", "recid": "4877", "relation": {}, "relation_version_is_last": true, "title": ["RDB-XML Security Model based on Masked Relations"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

RDB-XML Security Model based on Masked Relations

http://hdl.handle.net/20.500.12678/0000004877
http://hdl.handle.net/20.500.12678/0000004877
806691ce-f8fd-4dbf-a041-b7463a27e629
878e4d59-964a-48c3-b94d-cd2954bbf2f5
None
Preview
Name / File License Actions
11077.pdf 11077.pdf (216 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:26:47.721027
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL