UCSY's Research Repository

Mandatory Access Control ByBiba Model

Show simple item record

dc.contributor.author Zune, Sheilar
dc.contributor.author Kham, Nang Saing Moon
dc.date.accessioned 2019-07-18T15:35:32Z
dc.date.available 2019-07-18T15:35:32Z
dc.date.issued 2017-12-27
dc.identifier.uri http://onlineresource.ucsy.edu.mm/handle/123456789/971
dc.description.abstract Database security and integrity are essential aspects of an organization’s security posture. Database security is the system, processes, and procedures that protect a database from unintended activities. It is important to develop a security model for every system that use database. Many different security models have been created to address different security concerns. The goal of all security models is to define the authorized and unauthorized states of a system and to restrict the system to moving into an unauthorized state. Models are based on either mandatory or discretionary access control. In this paper, the main intention is to implement Biba Ring Policy that is use to maintain integrity of resources and to provide right access control based on user’s roles and attributes that are assigned according to UCSY’s attendance policy decision in Online Attendance Marking system - a system that will replace paper-based attendance into digital attendance system. There is no doubt that an attendance system will help save time and money by eliminating a great deal of manual processes involved in attendance and leave entry and calculating attendance percentage. en_US
dc.language.iso en en_US
dc.publisher Eighth Local Conference on Parallel and Soft Computing en_US
dc.title Mandatory Access Control ByBiba Model en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository



Browse

My Account

Statistics