UCSY's Research Repository

Controlling Database Security by Combination of Role-based Access Control (RBAC) and Mandatory Access Control (MAC)

Show simple item record

dc.contributor.author Soe, Aye Aye
dc.contributor.author Phyu, Sabai
dc.date.accessioned 2019-07-12T04:32:28Z
dc.date.available 2019-07-12T04:32:28Z
dc.date.issued 2010-12-16
dc.identifier.uri http://onlineresource.ucsy.edu.mm/handle/123456789/838
dc.description.abstract Database security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authenticated misuse, malicious attacks or inadvertent mistakes made by authorized individuals or processes. Database security can begin with the process of creation and publishing of appropriate security standards for the database environment. The standards may include specific controls for the various relevant database platforms; a set of best practices that cross over the platforms; and linkages of the standards to higher level polices and regulations. Proposed system presents constraint based security model implemented on student database to enhance data security by combination of Role Based Access Control (RBAC) and Mandatory Access Control (MAC). en_US
dc.language.iso en en_US
dc.publisher Fifth Local Conference on Parallel and Soft Computing en_US
dc.subject database security en_US
dc.subject role based access control en_US
dc.subject mandatory access control en_US
dc.subject authentication en_US
dc.title Controlling Database Security by Combination of Role-based Access Control (RBAC) and Mandatory Access Control (MAC) en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository



Browse

My Account

Statistics