An empirical study of the characteristics of access control model towards secure KMS in collaborative environment
Knowledge Management System (KMS) is widely deployed as organizations acknowledged the importance to manage critical knowledge efficiently in secure manner. More over the community of practice (CoP) benefit the growing of Internet by constructing a collaborative KMS for better communication. However...
| Main Authors: | Abu Bakar, Azreena, Abdullah, Rusli, Udzir, Nur Izura, Ibrahim, Hamidah |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2011
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/69092/ http://psasir.upm.edu.my/id/eprint/69092/1/An%20empirical%20study%20of%20the%20characteristics%20of%20access%20control%20model%20towards%20secure%20KMS%20in%20collaborative%20environment.pdf |
Similar Items
A framework of secure KMS with RBAC implementation
by: Abu Bakar, Azreena, et al.
Published: (2015)
by: Abu Bakar, Azreena, et al.
Published: (2015)
Security extensible access control markup language policy integration based on role-based access control model in healthcare collaborative environments
by: Teo, Poh Kuang, et al.
Published: (2011)
by: Teo, Poh Kuang, et al.
Published: (2011)
Agent-based tool to support collaborative KMS in software maintenance process environment
by: Mohd Nor, Mohd Zali, et al.
Published: (2008)
by: Mohd Nor, Mohd Zali, et al.
Published: (2008)
KMS components for collaborative software maintenance – a pilot study
by: Mohd Nor, Mohd Zali, et al.
Published: (2010)
by: Mohd Nor, Mohd Zali, et al.
Published: (2010)
Security policy integration based on role-based access control model in healthcare collaborative environments
by: Teo, Poh Kuang, et al.
Published: (2010)
by: Teo, Poh Kuang, et al.
Published: (2010)
Towards developing agent-based KMS in managing knowledge of green SD for community of practice
by: Tee, Mcxin, et al.
Published: (2017)
by: Tee, Mcxin, et al.
Published: (2017)
A compact bit string accessibility map for secure XML query processing
by: Mirabi, Meghdad, et al.
Published: (2012)
by: Mirabi, Meghdad, et al.
Published: (2012)
A dynamic compressed accessibility map for secure XML querying and updating
by: Mirabi, Meghdad, et al.
Published: (2015)
by: Mirabi, Meghdad, et al.
Published: (2015)
A model of knowledge management system and early warning system (KMS@EWS) for clinical diagnostic environment
by: Mohamad Noor, Norzaliha, et al.
Published: (2011)
by: Mohamad Noor, Norzaliha, et al.
Published: (2011)
Evaluating an agent-based software maintenance knowledge management system (KMS) tool
by: Abdullah, Rusli
Published: (2011)
by: Abdullah, Rusli
Published: (2011)
A reality-based guide to KMS diffusion
by: Xu, Jun, et al.
Published: (2005)
by: Xu, Jun, et al.
Published: (2005)
Blockchain-based access control scheme for secure shared personal health records over decentralised storage
by: Hussien, Hassan Mansur, et al.
Published: (2021)
by: Hussien, Hassan Mansur, et al.
Published: (2021)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
Conceptualization of the Antecedents and Impacts of KMS Utilization: A preliminary framework.
by: Ishaq, Oyefolahan, et al.
Published: (2010)
by: Ishaq, Oyefolahan, et al.
Published: (2010)
Semantic knowledge retrieval KMS components-validating the questionnaire items
by: Umar, Abdulmajid Babangida, et al.
Published: (2017)
by: Umar, Abdulmajid Babangida, et al.
Published: (2017)
An autonomous role and consideration of electronic health systems with access control in developed countries: a review
by: Salji, Mohd Rafiz, et al.
Published: (2023)
by: Salji, Mohd Rafiz, et al.
Published: (2023)
The adoption of Knowledge Management Systems (KMS) among academicians in Nigeria universities
by: Salami, Ahmed, et al.
Published: (2019)
by: Salami, Ahmed, et al.
Published: (2019)
Differentiating KMS Strategy from Business Strategy, KM Strategy and IS/IT Strategy
by: Md. Saad, Nor Hasliza, et al.
Published: (2005)
by: Md. Saad, Nor Hasliza, et al.
Published: (2005)
User access control and security model
by: Crysdian, Cahyo, et al.
Published: (2000)
by: Crysdian, Cahyo, et al.
Published: (2000)
Role performance trust-based access control for protecting sensitive attributes
by: Salji, Mohd Rafiz, et al.
Published: (2016)
by: Salji, Mohd Rafiz, et al.
Published: (2016)
Performance and divisional trust and purpose-based access control for privacy preservation
by: Salji, Mohd Rafiz, et al.
Published: (2018)
by: Salji, Mohd Rafiz, et al.
Published: (2018)
Trust, purpose, and role-based access control model for privacy protection
by: Salji, Mohd Rafiz, et al.
Published: (2019)
by: Salji, Mohd Rafiz, et al.
Published: (2019)
Access control in open distributed systems
by: Udzir, Nur Izura, et al.
Published: (2012)
by: Udzir, Nur Izura, et al.
Published: (2012)
Trust-based access control model with quantification method for protecting sensitive attributes
by: Salji, Mohd Rafiz, et al.
Published: (2022)
by: Salji, Mohd Rafiz, et al.
Published: (2022)
Towards secure model for SCADA systems
by: Daryabar, Farid, et al.
Published: (2012)
by: Daryabar, Farid, et al.
Published: (2012)
Secure role based access control systems using aspect-orientation designing
by: Hazaa, Muneer A., et al.
Published: (2009)
by: Hazaa, Muneer A., et al.
Published: (2009)
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
Policy inconsistency detection based on RBAC model in cross-organizational collaboration
by: Teo, Poh Kuang, et al.
Published: (2011)
by: Teo, Poh Kuang, et al.
Published: (2011)
Collaborative virtual 3D environment for internet-accessible physics experiments
by: Scheucher, T., et al.
Published: (2009)
by: Scheucher, T., et al.
Published: (2009)
Collaborative virtual 3D environment for internet-accessible physics experiments
by: Scheucher, B., et al.
Published: (2009)
by: Scheucher, B., et al.
Published: (2009)
A conceptual framework for information privacy and security in collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Towards a dynamic file integrity monitor through a security classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
Research framework on KMS use: an approach anchored on the interplays between engineered and emergent organizational factors
by: Oyebisi, Ishaq Oyefolahan, et al.
Published: (2013)
by: Oyebisi, Ishaq Oyefolahan, et al.
Published: (2013)
Knowledge management system in a collaborative environment
by: Abdullah, Rusli
Published: (2008)
by: Abdullah, Rusli
Published: (2008)
A binary access control scheme with high data security.
by: Islam, Md. Rafiqul, et al.
Published: (2002)
by: Islam, Md. Rafiqul, et al.
Published: (2002)
Towards developing experience based factory model for software requirement engineering process in collaborative environment
by: Hanafiah, Mastura, et al.
Published: (2014)
by: Hanafiah, Mastura, et al.
Published: (2014)
The development of bioinformatics knowledge management system with collaborative environment.
by: Abdullah, Rusli, et al.
Published: (2008)
by: Abdullah, Rusli, et al.
Published: (2008)
Collaborative knowledge management application support teaching and learning environment
by: Abdullah, Rusli
Published: (2007)
by: Abdullah, Rusli
Published: (2007)
Hierarchical secure virtualization model for cloud.
by: Manavi, Sina, et al.
Published: (2012)
by: Manavi, Sina, et al.
Published: (2012)
Universal design and accessibility: towards sustainable built environment in Malaysia
by: Abdul Rahim, Asiah
Published: (2015)
by: Abdul Rahim, Asiah
Published: (2015)
Similar Items
-
A framework of secure KMS with RBAC implementation
by: Abu Bakar, Azreena, et al.
Published: (2015) -
Security extensible access control markup language policy integration based on role-based access control model in healthcare collaborative environments
by: Teo, Poh Kuang, et al.
Published: (2011) -
Agent-based tool to support collaborative KMS in software maintenance process environment
by: Mohd Nor, Mohd Zali, et al.
Published: (2008) -
KMS components for collaborative software maintenance – a pilot study
by: Mohd Nor, Mohd Zali, et al.
Published: (2010) -
Security policy integration based on role-based access control model in healthcare collaborative environments
by: Teo, Poh Kuang, et al.
Published: (2010)