Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "49c94a52-77d6-497b-b16a-c411c9be7d8b"}, "_deposit": {"id": "5081", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "5081"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/5081", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Mandatory Access Control ByBiba Model", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Database security and integrity areessential aspects of an organization’s securityposture. Database security is the system,processes, and procedures that protect a databasefrom unintended activities. It is important todevelop a security model for every system that usedatabase. Many different security models havebeen created to address different securityconcerns. The goal of all security models is todefine the authorized and unauthorized states of asystem and to restrict the system to moving into anunauthorized state. Models are based on eithermandatory or discretionary access control. In thispaper, the main intention is to implement BibaRing Policy that is use to maintain integrity ofresources and to provide right access controlbased on user’s roles and attributes that areassigned according to UCSY’s attendance policydecision in Online Attendance Marking system -a system that will replace paper-based attendanceinto digital attendance system. There is no doubtthat an attendance system will help save time andmoney by eliminating a great deal of manualprocesses involved in attendance and leave entryand calculating attendance percentage."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-18"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "74_PDFsam_PSC_final proof.pdf", "filesize": [{"value": "247 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 247000.0, "url": {"url": "https://meral.edu.mm/record/5081/files/74_PDFsam_PSC_final proof.pdf"}, "version_id": "6c95b845-97b7-40e5-aa6f-551dfaf79574"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Eighth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Zune, Sheilar"}, {"subitem_authors_fullname": "Kham, Nang Saing Moon"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2017-12-27"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/971"}, "item_title": "Mandatory Access Control ByBiba Model", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000005081", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-18"}, "publish_date": "2019-07-18", "publish_status": "0", "recid": "5081", "relation": {}, "relation_version_is_last": true, "title": ["Mandatory Access Control ByBiba Model"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Mandatory Access Control ByBiba Model

http://hdl.handle.net/20.500.12678/0000005081
http://hdl.handle.net/20.500.12678/0000005081
a0d4ca26-2738-4ff5-b8ed-64753abd4ca1
49c94a52-77d6-497b-b16a-c411c9be7d8b
None
Preview
Name / File License Actions
74_PDFsam_PSC_final 74_PDFsam_PSC_final proof.pdf (247 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:43:38.909491
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL