Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "b708bdc5-9d72-499c-b568-083fe214c65e"}, "_deposit": {"id": "4937", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4937"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4937", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Controlling Database Security by Combination of Role-based Access Control (RBAC) and Mandatory Access Control (MAC)", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Database security is the system, processes, andprocedures that protect a database from unintendedactivity. Unintended activity can be categorized asauthenticated misuse, malicious attacks orinadvertent mistakes made by authorized individualsor processes. Database security can begin with theprocess of creation and publishing of appropriatesecurity standards for the database environment. Thestandards may include specific controls for thevarious relevant database platforms; a set of bestpractices that cross over the platforms; and linkagesof the standards to higher level polices andregulations. Proposed system presents constraintbased security model implemented on studentdatabase to enhance data security by combination ofRole Based Access Control (RBAC) and MandatoryAccess Control (MAC)."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "database security"}, {"interim": "role based access control"}, {"interim": "mandatory access control"}, {"interim": "authentication"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-12"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (122).pdf", "filesize": [{"value": "70 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 70000.0, "url": {"url": "https://meral.edu.mm/record/4937/files/psc2010paper (122).pdf"}, "version_id": "ea844bd2-2495-49d8-a8c7-670d5bc6e220"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Soe, Aye Aye"}, {"subitem_authors_fullname": "Phyu, Sabai"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/838"}, "item_title": "Controlling Database Security by Combination of Role-based Access Control (RBAC) and Mandatory Access Control (MAC)", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004937", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-12"}, "publish_date": "2019-07-12", "publish_status": "0", "recid": "4937", "relation": {}, "relation_version_is_last": true, "title": ["Controlling Database Security by Combination of Role-based Access Control (RBAC) and Mandatory Access Control (MAC)"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Controlling Database Security by Combination of Role-based Access Control (RBAC) and Mandatory Access Control (MAC)

http://hdl.handle.net/20.500.12678/0000004937
http://hdl.handle.net/20.500.12678/0000004937
18a75d61-cf0e-43a8-b508-e7aa807834d6
b708bdc5-9d72-499c-b568-083fe214c65e
None
Preview
Name / File License Actions
psc2010paper psc2010paper (122).pdf (70 Kb)
Publication type
Article
Upload type
Publication
Title
Title Controlling Database Security by Combination of Role-based Access Control (RBAC) and Mandatory Access Control (MAC)
Language en
Publication date 2010-12-16
Authors
Soe, Aye Aye
Phyu, Sabai
Description
Database security is the system, processes, andprocedures that protect a database from unintendedactivity. Unintended activity can be categorized asauthenticated misuse, malicious attacks orinadvertent mistakes made by authorized individualsor processes. Database security can begin with theprocess of creation and publishing of appropriatesecurity standards for the database environment. Thestandards may include specific controls for thevarious relevant database platforms; a set of bestpractices that cross over the platforms; and linkagesof the standards to higher level polices andregulations. Proposed system presents constraintbased security model implemented on studentdatabase to enhance data security by combination ofRole Based Access Control (RBAC) and MandatoryAccess Control (MAC).
Keywords
database security, role based access control, mandatory access control, authentication
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/838
Journal articles
Fifth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:32:35.458691
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL