Secured knowledge sharing and creation using RBAC model for e-village
This paper introduces a Role Based Access Control (RBAC) model for e-Village in creating and sharing knowledge in a secure way. This includes secure information about marketing to help the products become an innovation and highly valuable. As a case study, the Pasir Region, East Kalimantan, has the...
| Main Authors: | Usino, Wendi, Mantoro, Teddy, Ayu, Media Anugerah, Harjanto, Nazir |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
North Atlantic University Union (NAUN)
2012
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/27931/ http://irep.iium.edu.my/27931/1/E-Village_17-852.pdf |
Similar Items
Role based access control for knowledge sharing in remote areas
by: Usino, Wendi, et al.
Published: (2011)
by: Usino, Wendi, et al.
Published: (2011)
Energy efficiency mechanism using mobile-based fermat's spiral in wireless sensor networks
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
A framework of secure KMS with RBAC implementation
by: Abu Bakar, Azreena, et al.
Published: (2015)
by: Abu Bakar, Azreena, et al.
Published: (2015)
Energy efficiency mechanisms using mobile node in wireless sensor networks
by: Mantoro, Teddy, et al.
Published: (2012)
by: Mantoro, Teddy, et al.
Published: (2012)
Sharing clinical information in P2P environment with RBAC mechanism.
by: Mirabi, Meghdad, et al.
Published: (2009)
by: Mirabi, Meghdad, et al.
Published: (2009)
Multi-observers of particle filter approach for estimating indoor mobile user location
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
Rehashing system security solutions in e-banking
by: Khan, Burhan ul Islam, et al.
Published: (2018)
by: Khan, Burhan ul Islam, et al.
Published: (2018)
Policy inconsistency detection based on RBAC model in cross-organizational collaboration
by: Teo, Poh Kuang, et al.
Published: (2011)
by: Teo, Poh Kuang, et al.
Published: (2011)
User pro-activities based on context history
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
Exploring a 'plug and play' smart home system for mobile user
by: Mantoro, Teddy, et al.
Published: (2012)
by: Mantoro, Teddy, et al.
Published: (2012)
Analyzing and managing the disturbance in a mining port stockyard system
by: Ayu, Media Anugerah, et al.
Published: (2010)
by: Ayu, Media Anugerah, et al.
Published: (2010)
Improving the accuracy of indoor user location using IEEE 802.11 signals
by: Mantoro, Teddy, et al.
Published: (2010)
by: Mantoro, Teddy, et al.
Published: (2010)
Toward the recognition of user activity based on user location in ubiquitous computing environments
by: Mantoro, Teddy, et al.
Published: (2008)
by: Mantoro, Teddy, et al.
Published: (2008)
Supporting student participation and interactivity in the classroom using mobile phones.
by: Ayu, Media Anugerah, et al.
Published: (2011)
by: Ayu, Media Anugerah, et al.
Published: (2011)
Supporting student participation and interactivity in the classroom using mobile phones.
by: Ayu, Media Anugerah, et al.
Published: (2011)
by: Ayu, Media Anugerah, et al.
Published: (2011)
VisUn-3D : Visualization of user navigation using 3D maps in virtual 3D walk-spaces for mobile user
by: Mantoro, Teddy, et al.
Published: (2010)
by: Mantoro, Teddy, et al.
Published: (2010)
An example-based machine translation approach for Bahasa Indonesia to English: an experiment using MOSES
by: Ayu, Media Anugerah, et al.
Published: (2011)
by: Ayu, Media Anugerah, et al.
Published: (2011)
On the review and setup of security audit using Kali Linux
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Enabling technology for the creation and sharing of knowledge
by: Abu Bakar, Ahmad Zaki
Published: (2001)
by: Abu Bakar, Ahmad Zaki
Published: (2001)
NFC secured online transaction in mobile computing business
by: Mantoro, Teddy, et al.
Published: (2012)
by: Mantoro, Teddy, et al.
Published: (2012)
Framework for Domain Name System Security Extensions (DNSSEC) to support the IPv6 infrastructure
by: Mantoro, Teddy, et al.
Published: (2012)
by: Mantoro, Teddy, et al.
Published: (2012)
Security aspects and efforts towards secure Internet of things
by: Wan Abdul Rahman, Wan Fariza, et al.
Published: (2017)
by: Wan Abdul Rahman, Wan Fariza, et al.
Published: (2017)
Secured mobile transaction using NFC Technology: Top-Up printing system
by: Ayu, Media Anugerah, et al.
Published: (2011)
by: Ayu, Media Anugerah, et al.
Published: (2011)
ICT based communication channels preferences towards knowledge sharing among multicultural students
by: Ayu, Media Anugerah, et al.
Published: (2012)
by: Ayu, Media Anugerah, et al.
Published: (2012)
Making location-aware computing working accurately in smart spaces
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
Online authentication using smart card technology in mobile phone infrastructure
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
Mobile user location prediction: genetic algorithm-based approach
by: Mantoro, Teddy, et al.
Published: (2010)
by: Mantoro, Teddy, et al.
Published: (2010)
Online payment procedure involving mobile phone network infrastructure and devices
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
Active learning: engaging students in the classroom using mobile phones
by: Ayu, Media Anugerah, et al.
Published: (2009)
by: Ayu, Media Anugerah, et al.
Published: (2009)
Live video streaming for mobile devices: an application on android platform
by: Mantoro, Teddy, et al.
Published: (2012)
by: Mantoro, Teddy, et al.
Published: (2012)
3D graphics visualization for interactive mobile users navigation
by: Mantoro, Teddy, et al.
Published: (2012)
by: Mantoro, Teddy, et al.
Published: (2012)
BBQE: multi-language string search approach for blackberry environment
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
GPS based tracking framework for walking pedestrian
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
3D mobile navigation for dynamic users interaction
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
Multi-user navigation: a 3D mobile device interactive support
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
Web-enabled smart home using wireless node infrastructure
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
Hajj crowd tracking system in a pervasive environment
by: Mantoro, Teddy, et al.
Published: (2012)
by: Mantoro, Teddy, et al.
Published: (2012)
A model for secure knowledge sharing
by: Ismail Ahmad,, et al.
Published: (2005)
by: Ismail Ahmad,, et al.
Published: (2005)
Internet of things security vulnerabilities and recommended solutions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
eSurvia: a web-based survey service using fuzzy conjoint analysis
by: Ayu, Media Anugerah, et al.
Published: (2010)
by: Ayu, Media Anugerah, et al.
Published: (2010)
Similar Items
-
Role based access control for knowledge sharing in remote areas
by: Usino, Wendi, et al.
Published: (2011) -
Energy efficiency mechanism using mobile-based fermat's spiral in wireless sensor networks
by: Mantoro, Teddy, et al.
Published: (2011) -
A framework of secure KMS with RBAC implementation
by: Abu Bakar, Azreena, et al.
Published: (2015) -
Energy efficiency mechanisms using mobile node in wireless sensor networks
by: Mantoro, Teddy, et al.
Published: (2012) -
Sharing clinical information in P2P environment with RBAC mechanism.
by: Mirabi, Meghdad, et al.
Published: (2009)