Index Link

  • RootNode

Item

{"_buckets": {"deposit": "b708bdc5-9d72-499c-b568-083fe214c65e"}, "_deposit": {"id": "4937", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4937"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4937", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Controlling Database Security by Combination of Role-based Access Control (RBAC) and Mandatory Access Control (MAC)", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Database security is the system, processes, andprocedures that protect a database from unintendedactivity. Unintended activity can be categorized asauthenticated misuse, malicious attacks orinadvertent mistakes made by authorized individualsor processes. Database security can begin with theprocess of creation and publishing of appropriatesecurity standards for the database environment. Thestandards may include specific controls for thevarious relevant database platforms; a set of bestpractices that cross over the platforms; and linkagesof the standards to higher level polices andregulations. Proposed system presents constraintbased security model implemented on studentdatabase to enhance data security by combination ofRole Based Access Control (RBAC) and MandatoryAccess Control (MAC)."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "database security"}, {"interim": "role based access control"}, {"interim": "mandatory access control"}, {"interim": "authentication"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-12"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (122).pdf", "filesize": [{"value": "70 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 70000.0, "url": {"url": "https://meral.edu.mm/record/4937/files/psc2010paper (122).pdf"}, "version_id": "ea844bd2-2495-49d8-a8c7-670d5bc6e220"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Soe, Aye Aye"}, {"subitem_authors_fullname": "Phyu, Sabai"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/838"}, "item_title": "Controlling Database Security by Combination of Role-based Access Control (RBAC) and Mandatory Access Control (MAC)", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004937", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-12"}, "publish_date": "2019-07-12", "publish_status": "0", "recid": "4937", "relation": {}, "relation_version_is_last": true, "title": ["Controlling Database Security by Combination of Role-based Access Control (RBAC) and Mandatory Access Control (MAC)"], "weko_shared_id": -1}

Controlling Database Security by Combination of Role-based Access Control (RBAC) and Mandatory Access Control (MAC)

http://hdl.handle.net/20.500.12678/0000004937
18a75d61-cf0e-43a8-b508-e7aa807834d6
b708bdc5-9d72-499c-b568-083fe214c65e
None
Name / File License Actions
psc2010paper psc2010paper (122).pdf (70 Kb)
Publication type
Article
Upload type
Publication
Title
Title Controlling Database Security by Combination of Role-based Access Control (RBAC) and Mandatory Access Control (MAC)
Language en
Publication date 2010-12-16
Authors
Soe, Aye Aye
Phyu, Sabai
Description
Database security is the system, processes, andprocedures that protect a database from unintendedactivity. Unintended activity can be categorized asauthenticated misuse, malicious attacks orinadvertent mistakes made by authorized individualsor processes. Database security can begin with theprocess of creation and publishing of appropriatesecurity standards for the database environment. Thestandards may include specific controls for thevarious relevant database platforms; a set of bestpractices that cross over the platforms; and linkagesof the standards to higher level polices andregulations. Proposed system presents constraintbased security model implemented on studentdatabase to enhance data security by combination ofRole Based Access Control (RBAC) and MandatoryAccess Control (MAC).
Keywords
database security, role based access control, mandatory access control, authentication
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/838
Journal articles
Fifth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
0
0
views
downloads
Views Downloads

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats