E-store management using bell-lapadula access control security model

Generally, the existing store management system does not provide any access control mechanism in order to manage resources. All levels of user have the same right to access the store and borrow the equipment. Therefore, the E-Store management system using Bell- LaPadula access control model was prop...

Full description

Bibliographic Details
Main Authors: Roslan, Saidah Nafisah, A Hamid, Isredza Rahmi, Palaniappan, Shamala
Format: Article
Language:English
Published: Information Technology Department Politeknik Negeri Padang, Indonesia 2018
Subjects:
Online Access:http://eprints.uthm.edu.my/3875/1/AJ%202018%20%28371%29.pdf
_version_ 1796868916809564160
author Roslan, Saidah Nafisah
A Hamid, Isredza Rahmi
Palaniappan, Shamala
author_facet Roslan, Saidah Nafisah
A Hamid, Isredza Rahmi
Palaniappan, Shamala
author_sort Roslan, Saidah Nafisah
collection UTHM
description Generally, the existing store management system does not provide any access control mechanism in order to manage resources. All levels of user have the same right to access the store and borrow the equipment. Therefore, the E-Store management system using Bell- LaPadula access control model was proposed. The prototyping methodology was used to develop the system because methodology model is quickly constructed to test or illustrate design features and ideas, in order to gather user feedback. Moreover, the system is built using hypertext processor (PHP) language. The E-Store system has three types of users, which are known as top management of Welding Department, lecturers and students. The user’s access control is divided by high-level privilege to lower-level privilege. Therefore, each user will have different login interface according to their role and access right to the system. Through the system, high-level user manages in and out equipment flow, manages authorization, view history log in activity and verify complaint report. Lower-level user can view list of equipment, report complaint and damage equipment and borrow equipment. The E-Store management system is expected to manage the store effectively and reduced redundancy issues of equipment requested. The user access right has been assigned based on their access level
first_indexed 2024-03-05T21:47:00Z
format Article
id uthm.eprints-3875
institution Universiti Tun Hussein Onn Malaysia
language English
last_indexed 2024-03-05T21:47:00Z
publishDate 2018
publisher Information Technology Department Politeknik Negeri Padang, Indonesia
record_format dspace
spelling uthm.eprints-38752021-11-22T04:37:43Z http://eprints.uthm.edu.my/3875/ E-store management using bell-lapadula access control security model Roslan, Saidah Nafisah A Hamid, Isredza Rahmi Palaniappan, Shamala TK5101-6720 Telecommunication. Including telegraphy, telephone, radio, radar, television Generally, the existing store management system does not provide any access control mechanism in order to manage resources. All levels of user have the same right to access the store and borrow the equipment. Therefore, the E-Store management system using Bell- LaPadula access control model was proposed. The prototyping methodology was used to develop the system because methodology model is quickly constructed to test or illustrate design features and ideas, in order to gather user feedback. Moreover, the system is built using hypertext processor (PHP) language. The E-Store system has three types of users, which are known as top management of Welding Department, lecturers and students. The user’s access control is divided by high-level privilege to lower-level privilege. Therefore, each user will have different login interface according to their role and access right to the system. Through the system, high-level user manages in and out equipment flow, manages authorization, view history log in activity and verify complaint report. Lower-level user can view list of equipment, report complaint and damage equipment and borrow equipment. The E-Store management system is expected to manage the store effectively and reduced redundancy issues of equipment requested. The user access right has been assigned based on their access level Information Technology Department Politeknik Negeri Padang, Indonesia 2018 Article PeerReviewed text en http://eprints.uthm.edu.my/3875/1/AJ%202018%20%28371%29.pdf Roslan, Saidah Nafisah and A Hamid, Isredza Rahmi and Palaniappan, Shamala (2018) E-store management using bell-lapadula access control security model. International journal on informatics visualization (JOIV), 2 (3-2). pp. 194-198. ISSN 2549-9610 https://doi.org/10.30630/joiv.2.3-2.140
spellingShingle TK5101-6720 Telecommunication. Including telegraphy, telephone, radio, radar, television
Roslan, Saidah Nafisah
A Hamid, Isredza Rahmi
Palaniappan, Shamala
E-store management using bell-lapadula access control security model
title E-store management using bell-lapadula access control security model
title_full E-store management using bell-lapadula access control security model
title_fullStr E-store management using bell-lapadula access control security model
title_full_unstemmed E-store management using bell-lapadula access control security model
title_short E-store management using bell-lapadula access control security model
title_sort e store management using bell lapadula access control security model
topic TK5101-6720 Telecommunication. Including telegraphy, telephone, radio, radar, television
url http://eprints.uthm.edu.my/3875/1/AJ%202018%20%28371%29.pdf
work_keys_str_mv AT roslansaidahnafisah estoremanagementusingbelllapadulaaccesscontrolsecuritymodel
AT ahamidisredzarahmi estoremanagementusingbelllapadulaaccesscontrolsecuritymodel
AT palaniappanshamala estoremanagementusingbelllapadulaaccesscontrolsecuritymodel