Dynamic user-defined access control policies via programming language / Suzana Ahmad
Allowing data sharing activities to the right users can be determined by concerned access control through assisting every attempt made by a user, to access a resource in an application system. The interests of authorized the users, who are protected by access control, can provide a safe, secure and...
| Main Author: | Ahmad, Suzana |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2018
|
| Subjects: | |
| Online Access: | https://ir.uitm.edu.my/id/eprint/26960/ |
Similar Items
Dynamicuser-defined accesscontrol policies via programming language / Suzana Ahmad
by: Ahmad, Suzana
Published: (2018)
by: Ahmad, Suzana
Published: (2018)
A prototype for converting and merging multi type databases to single database / Suzana Ahmad and Siti Zaleha Zainal Abidin
by: Ahmad, Suzana, et al.
Published: (2013)
by: Ahmad, Suzana, et al.
Published: (2013)
Data sharing management model in networked collaborative environment / Nasiroh Omar, Siti Zaleha Zainal Abidin and Suzana Ahmad
by: Omar, Nasiroh, et al.
Published: (2012)
by: Omar, Nasiroh, et al.
Published: (2012)
Sistem pakar pencarian maklumat berasakan queri (EsQIR) /
Suzana Yusof
by: Suzana , Yusof
Published: (2003)
by: Suzana , Yusof
Published: (2003)
User defined methods
by: Hakro, Dil Nawaz, et al.
Published: (2011)
by: Hakro, Dil Nawaz, et al.
Published: (2011)
User access control and security model
by: Crysdian, Cahyo, et al.
Published: (2000)
by: Crysdian, Cahyo, et al.
Published: (2000)
The language of genders in the "Labour of Love" / Suzana Ab. Rahim
by: Ab. Rahim, Suzana
Published: (2005)
by: Ab. Rahim, Suzana
Published: (2005)
Implementation of e-rental housing via generic notification message through mobile phone / Suzana Ahmad, Norzehan Sakamat and Noorazida Mohd Idris
by: Ahmad, Suzana, et al.
Published: (2009)
by: Ahmad, Suzana, et al.
Published: (2009)
Communication strategies in Japanese language interactions among Malay students at the University of Malaya / Suzana Ismail.
by: Ismail, Suzana
Published: (2004)
by: Ismail, Suzana
Published: (2004)
Asessment of halal governance issues in Malaysia / Ahmad Naqiyuddin Bakar, Harlina Suzana Jaafar & Nornadia Matulidi
by: Bakar, Ahmad Naqiyuddin, et al.
Published: (2019)
by: Bakar, Ahmad Naqiyuddin, et al.
Published: (2019)
Halal risk management in the internet age / Ahmad Naqiyuddin Bakar, Harlina Suzana Jaafar & Nornadia Matulidi
by: Bakar, Ahmad Naqiyuddin, et al.
Published: (2019)
by: Bakar, Ahmad Naqiyuddin, et al.
Published: (2019)
Route planner mobile web application for UiTM Malaysia / Suzana Ahmad ... [et al.]
by: Ahmad, Suzana, et al.
Published: (2009)
by: Ahmad, Suzana, et al.
Published: (2009)
Analysis of evolutionary computing performance via mapreduce parallel processing architecture / Ahmad Firdaus Ahmad Fadzil
by: Ahmad, Ahmad Firdaus
Published: (2014)
by: Ahmad, Ahmad Firdaus
Published: (2014)
Learn Jawi using gaming approach on mobile devices / Norizan Mat Diah, Marina Ismail and Suzana Ahmad
by: Mat Diah, Norizan, et al.
Published: (2012)
by: Mat Diah, Norizan, et al.
Published: (2012)
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
by: Mohd Satar, Siti Dhalila
Published: (2023)
by: Mohd Satar, Siti Dhalila
Published: (2023)
A source code perspective C overflow vulnerabilities exploit taxonomy based on well-defined criteria / Nurul Haszeli Ahmad
by: Ahmad, Nurul Haszeli
Published: (2015)
by: Ahmad, Nurul Haszeli
Published: (2015)
Door Access System via Fingerprint with GSM (ReSMART)
by: Muhamad Hafizuddin, Afiq Anuar, et al.
Published: (2016)
by: Muhamad Hafizuddin, Afiq Anuar, et al.
Published: (2016)
Design and evaluation of a mobile user interface usability / Ahmad Khairul Azizi Ahmad ... [et al.]
by: Ahmad Khairul Azizi, Ahmad, et al.
Published: (2018)
by: Ahmad Khairul Azizi, Ahmad, et al.
Published: (2018)
Users' perception of the information security policy at Universiti Teknologi Malaysia
by: Sharif, Haniza
Published: (2009)
by: Sharif, Haniza
Published: (2009)
Speech recognition for Malay Language to command & control computer program / Mohd Junaidi Jusoh
by: Jusoh, Mohd Junaidi
Published: (2007)
by: Jusoh, Mohd Junaidi
Published: (2007)
The effectiveness of floor finishes in shopping centers / Elis Suzana Muhamad
by: Muhamad, Elis Suzana
Published: (2001)
by: Muhamad, Elis Suzana
Published: (2001)
Push-based XML access control policy languages: a review
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2014)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2014)
A model for controlling access to XML documents.
by: Rahman, Kh. Azizur, et al.
Published: (2003)
by: Rahman, Kh. Azizur, et al.
Published: (2003)
Graphical user interface layout language using combinators
by: Kasmiran, Khairul Azhar
Published: (2006)
by: Kasmiran, Khairul Azhar
Published: (2006)
Cost Effective Network Flow Measurement for Software Defined Networks: A Distributed Controller Scenario
by: Tahaei, Hamid, et al.
Published: (2018)
by: Tahaei, Hamid, et al.
Published: (2018)
Adaptive Concurrent Medium Access Control for Wireless Mesh Network
by: Ibrahim, Mohd Sufiz, et al.
Published: (2010)
by: Ibrahim, Mohd Sufiz, et al.
Published: (2010)
Estimating Depressive Tendencies Of Twitter User Via Social Media Data
by: Loh, Hooi Teng
Published: (2023)
by: Loh, Hooi Teng
Published: (2023)
Edge segmentation of Malay sign language images / Ahmad Zaki Bahrudin
by: Bahrudin, Ahmad Zaki
Published: (2017)
by: Bahrudin, Ahmad Zaki
Published: (2017)
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
Enhancement of adhesive bonding strength: surface roughness and wettability characterisations / Norazwani Muhammad Zain, Sahrim Hj Ahmad and Ernie Suzana Ali
by: Muhammad Zain, Norazwani, et al.
Published: (2014)
by: Muhammad Zain, Norazwani, et al.
Published: (2014)
Analyzing the periocular biometric-based access control systems
by: Mon, Chit Su, et al.
Published: (2020)
by: Mon, Chit Su, et al.
Published: (2020)
The structural and functional changes of management accountants / Aliza Ramli and Suzana Sulaiman
by: Ramli, Aliza, et al.
Published: (2006)
by: Ramli, Aliza, et al.
Published: (2006)
3D mobile navigation for dynamic users interaction
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
Dual Access Control for Cloud Storage and Sharing
by: Sandeep, T.S., et al.
Published: (2024)
by: Sandeep, T.S., et al.
Published: (2024)
A needs-analysis on the engineering undergraduates' communication skills / Suzana Ab. Rahim
by: Ab. Rahim, Suzana
Published: (2008)
by: Ab. Rahim, Suzana
Published: (2008)
Modelling and verifying dynamic access control policies in workflow-based healthcare systems
by: Faruqui, Rokan Uddin
Published: (2020)
by: Faruqui, Rokan Uddin
Published: (2020)
A preliminary study of course information on i-Learn perspectives : focusing in accessibility, contents and user interface parameter / Noor Saadah Sulaiman
by: Sulaiman, Noor Saadah
Published: (2007)
by: Sulaiman, Noor Saadah
Published: (2007)
Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq
by: Bilal , Ishfaq
Published: (2016)
by: Bilal , Ishfaq
Published: (2016)
A binary access control scheme with high data security.
by: Islam, Md. Rafiqul, et al.
Published: (2002)
by: Islam, Md. Rafiqul, et al.
Published: (2002)
A Malay language-based visual programming language for personal digital assistant
by: Sulaiman, Md. Nasir, et al.
Published: (2008)
by: Sulaiman, Md. Nasir, et al.
Published: (2008)
Similar Items
-
Dynamicuser-defined accesscontrol policies via programming language / Suzana Ahmad
by: Ahmad, Suzana
Published: (2018) -
A prototype for converting and merging multi type databases to single database / Suzana Ahmad and Siti Zaleha Zainal Abidin
by: Ahmad, Suzana, et al.
Published: (2013) -
Data sharing management model in networked collaborative environment / Nasiroh Omar, Siti Zaleha Zainal Abidin and Suzana Ahmad
by: Omar, Nasiroh, et al.
Published: (2012) -
Sistem pakar pencarian maklumat berasakan queri (EsQIR) /
Suzana Yusof
by: Suzana , Yusof
Published: (2003) -
User defined methods
by: Hakro, Dil Nawaz, et al.
Published: (2011)