User access control and security model
Securing information system becomes the highlight of technology following quick development of computer networking and the Internet. People have known the method to enforce security over a database, but the necessities to get more secure system never reach boundaries. Now days the trend of informati...
Main Authors: | Crysdian, Cahyo, Selamat, Harihodin, Md. Sap, Mohd. Noor |
---|---|
Format: | Article |
Language: | English |
Published: |
Penerbit UTM Press
2000
|
Subjects: | |
Online Access: | http://eprints.utm.my/8712/1/HarihodinSelamat2000_UserAccessControlAndSecurity.pdf |
Similar Items
-
A binary access control scheme with single key
by: Islam, Md. Rafiqul, et al.
Published: (1997) -
A binary access control scheme with high data security.
by: Islam, Md. Rafiqul, et al.
Published: (2002) -
Database security: general and research perspectives
by: Islam, Md. Rafiqul, et al.
Published: (1996) -
Active firewall mechanism as a comprehensive approach towards minimizing internet threats
by: Crysdian, Cahyo
Published: (2006) -
A model for controlling access to XML documents.
by: Rahman, Kh. Azizur, et al.
Published: (2003)