User access control and security model

Securing information system becomes the highlight of technology following quick development of computer networking and the Internet. People have known the method to enforce security over a database, but the necessities to get more secure system never reach boundaries. Now days the trend of informati...

Full description

Saved in:
Bibliographic Details
Main Authors: Crysdian, Cahyo, Selamat, Harihodin, Md. Sap, Mohd. Noor
Format: Article
Language:English
Published: Penerbit UTM Press 2000
Subjects:
Online Access:http://eprints.utm.my/id/eprint/8712/1/HarihodinSelamat2000_UserAccessControlAndSecurity.pdf
http://eprints.utm.my/id/eprint/8712/
Tags: Add Tag
No Tags, Be the first to tag this record!