dc.description.abstract |
Database security and integrity are
essential aspects of an organization’s security
posture. Database security is the system,
processes, and procedures that protect a database
from unintended activities. It is important to
develop a security model for every system that use
database. Many different security models have
been created to address different security
concerns. The goal of all security models is to
define the authorized and unauthorized states of a
system and to restrict the system to moving into an
unauthorized state. Models are based on either
mandatory or discretionary access control. In this
paper, the main intention is to implement Biba
Ring Policy that is use to maintain integrity of
resources and to provide right access control
based on user’s roles and attributes that are
assigned according to UCSY’s attendance policy
decision in Online Attendance Marking system -
a system that will replace paper-based attendance
into digital attendance system. There is no doubt
that an attendance system will help save time and
money by eliminating a great deal of manual
processes involved in attendance and leave entry
and calculating attendance percentage. |
en_US |