dc.contributor.author | Soe, Aye Aye | |
dc.contributor.author | Phyu, Sabai | |
dc.date.accessioned | 2019-07-12T04:32:28Z | |
dc.date.available | 2019-07-12T04:32:28Z | |
dc.date.issued | 2010-12-16 | |
dc.identifier.uri | http://onlineresource.ucsy.edu.mm/handle/123456789/838 | |
dc.description.abstract | Database security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authenticated misuse, malicious attacks or inadvertent mistakes made by authorized individuals or processes. Database security can begin with the process of creation and publishing of appropriate security standards for the database environment. The standards may include specific controls for the various relevant database platforms; a set of best practices that cross over the platforms; and linkages of the standards to higher level polices and regulations. Proposed system presents constraint based security model implemented on student database to enhance data security by combination of Role Based Access Control (RBAC) and Mandatory Access Control (MAC). | en_US |
dc.language.iso | en | en_US |
dc.publisher | Fifth Local Conference on Parallel and Soft Computing | en_US |
dc.subject | database security | en_US |
dc.subject | role based access control | en_US |
dc.subject | mandatory access control | en_US |
dc.subject | authentication | en_US |
dc.title | Controlling Database Security by Combination of Role-based Access Control (RBAC) and Mandatory Access Control (MAC) | en_US |
dc.type | Article | en_US |