{"created":"2020-09-01T15:32:46.816766+00:00","id":4940,"links":{},"metadata":{"_buckets":{"deposit":"88ea3eab-d3ba-4b3d-8baa-e98d1daeddbe"},"_deposit":{"id":"4940","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4940"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4940","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Implementation of Executive Information System on Client/Server Architecture Controlled by Role Based Access Control Mechanisms","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"The Organisations are implementing ExecutiveInformation Systems (EISs) to handle increasingamounts of money which are being invested. Becausethey need to use an effective EIS in order to achievecompetitive advantage in markets. And EISs improvethe quality of management in organization by providingvisual reports. However, EISs development projectsincur risks. As a consequence, the eventual success ofthis kind of systems is affected by various factorsespecially during the use of the system. Therefore theproposed system is to develop an EIS on client/serverarchitecture. Furthermore to overcome the problemsfaced during the use of the system due to the securityrisks, Role Based Access Control (RBAC) mechanism isused to regulate the access right of the authorizedusers. That means users with different roles can accessto the system with different permissions. This systemwill implement an EIS for dental clinic on client/serversystem controlled by RBAC using Microsoft SQL Server2005 DBMS."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-12"}],"displaytype":"preview","filename":"psc2010paper (123).pdf","filesize":[{"value":"146 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4940/files/psc2010paper (123).pdf"},"version_id":"ce784690-e321-47eb-97a4-73068df7d3cb"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fifth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Khine, Nila Eingyin"},{"subitem_authors_fullname":"Hole, Gilmour"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2010-12-16"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/840"},"item_title":"Implementation of Executive Information System on Client/Server Architecture Controlled by Role Based Access Control Mechanisms","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-12","publish_status":"0","recid":"4940","relation_version_is_last":true,"title":["Implementation of Executive Information System on Client/Server Architecture Controlled by Role Based Access Control Mechanisms"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T02:39:23.017821+00:00"}