{"created":"2020-09-01T15:26:44.853588+00:00","id":4877,"links":{},"metadata":{"_buckets":{"deposit":"878e4d59-964a-48c3-b94d-cd2954bbf2f5"},"_deposit":{"id":"4877","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4877"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4877","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"RDB-XML Security Model based on Masked Relations","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Relational databases get more and more employed in order to store the contents of a web site. At the same time, XML is a fast emerging technology, which is the standard of data exchange over the web and due to the new requirements emerging from several applications there is a great need for the integration between XML and Database technology. Moreover, Security is becoming one of the most urgent challenges in database research and industry, and the challenge is intensifying due to the enormous popularity of web-based applications. There are a lot of researches about security for XML databases or relational databases, but the researches do not consider the fact that integrated RDB-XML system to publish XML data reside in relational database. This paper explores security techniques for proposed security model in which secure data stored in relational database, access controls for XML data are also specified in relational model, secure key scheme and secure data transfer as a XML document."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-11"}],"displaytype":"preview","filename":"11077.pdf","filesize":[{"value":"216 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4877/files/11077.pdf"},"version_id":"7bfd698b-e0b8-417f-aacb-f42a563e8681"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Eleventh International Conference On Computer Applications (ICCA 2013)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Kham, Nang Saing Moon"},{"subitem_authors_fullname":"Thin, Lwin Mar"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2013-02-26"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/772"},"item_title":"RDB-XML Security Model based on Masked Relations","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-11","publish_status":"0","recid":"4877","relation_version_is_last":true,"title":["RDB-XML Security Model based on Masked Relations"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T04:07:47.689262+00:00"}