User access control and security model

Securing information system becomes the highlight of technology following quick development of computer networking and the Internet. People have known the method to enforce security over a database, but the necessities to get more secure system never reach boundaries. Now days the trend of informati...

Full description

Saved in:
Bibliographic Details
Main Authors: Crysdian, Cahyo, Selamat, Harihodin, Md. Sap, Mohd. Noor
Format: Article
Language:English
Published: Penerbit UTM Press 2000
Subjects:
Online Access:http://eprints.utm.my/id/eprint/8712/1/HarihodinSelamat2000_UserAccessControlAndSecurity.pdf
http://eprints.utm.my/id/eprint/8712/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.8712
record_format eprints
spelling my.utm.87122017-11-01T04:17:51Z http://eprints.utm.my/id/eprint/8712/ User access control and security model Crysdian, Cahyo Selamat, Harihodin Md. Sap, Mohd. Noor QA75 Electronic computers. Computer science Securing information system becomes the highlight of technology following quick development of computer networking and the Internet. People have known the method to enforce security over a database, but the necessities to get more secure system never reach boundaries. Now days the trend of information system is the open connection system where users are able to access system from many places. It leads the involvement of user access control as a part of database security since it takes a big role in governing access request of each user. This security component serves as a part of defense to secure data contained in the system. Development of user access control began on the early of seventies with DAC technology. Right now technology of user access control has reached sophisticated method with RBAC, but development of organization using information system and the development of information system itself push the improvement of user access control technology. This paper provides information about security system with the emphasis on user access control, which includes DAC, MAC and RBAC and the implementation of each user access control in security model. Comparison of each user access control method is given at the end of the paper. Penerbit UTM Press 2000-12 Article PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/8712/1/HarihodinSelamat2000_UserAccessControlAndSecurity.pdf Crysdian, Cahyo and Selamat, Harihodin and Md. Sap, Mohd. Noor (2000) User access control and security model. Jurnal Teknologi Maklumat, 12 (2). pp. 102-116. ISSN 0128-3790
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Crysdian, Cahyo
Selamat, Harihodin
Md. Sap, Mohd. Noor
User access control and security model
description Securing information system becomes the highlight of technology following quick development of computer networking and the Internet. People have known the method to enforce security over a database, but the necessities to get more secure system never reach boundaries. Now days the trend of information system is the open connection system where users are able to access system from many places. It leads the involvement of user access control as a part of database security since it takes a big role in governing access request of each user. This security component serves as a part of defense to secure data contained in the system. Development of user access control began on the early of seventies with DAC technology. Right now technology of user access control has reached sophisticated method with RBAC, but development of organization using information system and the development of information system itself push the improvement of user access control technology. This paper provides information about security system with the emphasis on user access control, which includes DAC, MAC and RBAC and the implementation of each user access control in security model. Comparison of each user access control method is given at the end of the paper.
format Article
author Crysdian, Cahyo
Selamat, Harihodin
Md. Sap, Mohd. Noor
author_facet Crysdian, Cahyo
Selamat, Harihodin
Md. Sap, Mohd. Noor
author_sort Crysdian, Cahyo
title User access control and security model
title_short User access control and security model
title_full User access control and security model
title_fullStr User access control and security model
title_full_unstemmed User access control and security model
title_sort user access control and security model
publisher Penerbit UTM Press
publishDate 2000
url http://eprints.utm.my/id/eprint/8712/1/HarihodinSelamat2000_UserAccessControlAndSecurity.pdf
http://eprints.utm.my/id/eprint/8712/
_version_ 1643645052175515648
score 13.15806