MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "49c94a52-77d6-497b-b16a-c411c9be7d8b"}, "_deposit": {"id": "5081", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "5081"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/5081", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Mandatory Access Control ByBiba Model", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Database security and integrity areessential aspects of an organization’s securityposture. Database security is the system,processes, and procedures that protect a databasefrom unintended activities. It is important todevelop a security model for every system that usedatabase. Many different security models havebeen created to address different securityconcerns. The goal of all security models is todefine the authorized and unauthorized states of asystem and to restrict the system to moving into anunauthorized state. Models are based on eithermandatory or discretionary access control. In thispaper, the main intention is to implement BibaRing Policy that is use to maintain integrity ofresources and to provide right access controlbased on user’s roles and attributes that areassigned according to UCSY’s attendance policydecision in Online Attendance Marking system -a system that will replace paper-based attendanceinto digital attendance system. There is no doubtthat an attendance system will help save time andmoney by eliminating a great deal of manualprocesses involved in attendance and leave entryand calculating attendance percentage."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-18"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "74_PDFsam_PSC_final proof.pdf", "filesize": [{"value": "247 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 247000.0, "url": {"url": "https://meral.edu.mm/record/5081/files/74_PDFsam_PSC_final proof.pdf"}, "version_id": "6c95b845-97b7-40e5-aa6f-551dfaf79574"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Eighth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Zune, Sheilar"}, {"subitem_authors_fullname": "Kham, Nang Saing Moon"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2017-12-27"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/971"}, "item_title": "Mandatory Access Control ByBiba Model", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000005081", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-18"}, "publish_date": "2019-07-18", "publish_status": "0", "recid": "5081", "relation": {}, "relation_version_is_last": true, "title": ["Mandatory Access Control ByBiba Model"], "weko_shared_id": -1}
Mandatory Access Control ByBiba Model
http://hdl.handle.net/20.500.12678/0000005081
http://hdl.handle.net/20.500.12678/0000005081a0d4ca26-2738-4ff5-b8ed-64753abd4ca1
49c94a52-77d6-497b-b16a-c411c9be7d8b
Name / File | License | Actions |
---|---|---|
![]() |
|