Secure software architecture approach for role-based access control using aspect-oriented design
Organizations define and enforce AC policies to protect sensitive information resources. The policy imposes requirements to ensure that only authorized users have access to the sensitive information resources. Normally, systems for various applications operate with different access control requireme...
| Main Author: | Saeed Hazaa, Muneer Abdullah |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/70802/ http://psasir.upm.edu.my/id/eprint/70802/1/FSKTM%202010%2011%20UPMIR.pdf |
Similar Items
Enhanced Medium Access Control Protocol for Resolving Node Misbehavior in Wireless Networks
by: Nordin, Noorsalwati
Published: (2007)
by: Nordin, Noorsalwati
Published: (2007)
Access control framework in a bring your own device environment
by: Morufu, Olalere
Published: (2016)
by: Morufu, Olalere
Published: (2016)
XML-based declarative access control
by: Steele, R., et al.
Published: (2005)
by: Steele, R., et al.
Published: (2005)
Toward efficient attribute-based searchable encryption for access control over blockchain
by: Hussein, Al-Abadi Hassan Mansur
Published: (2021)
by: Hussein, Al-Abadi Hassan Mansur
Published: (2021)
A study of campus wireless network technology acceptance among student in UiTM Terengganu, Dungun Campus / Aainaa Abdul Rahim, Nur Izyan Kamaru Zaman and Zaimatul Adawiah Zainuddin
by: Abdul Rahim, Aainaa, et al.
Published: (2012)
by: Abdul Rahim, Aainaa, et al.
Published: (2012)
Ehancing security and privacy in local area network with TORVPN using : raspberry pi as access point / Mohamad AfiqHakimi Rosli
by: Rosli, Mohamad AfiqHakimi
Published: (2019)
by: Rosli, Mohamad AfiqHakimi
Published: (2019)
SafeSearch – Microcomputer based VPN / Mohamad Ridzuan Mohd Alias
by: Mohd Alias, Mohamad Ridzuan
Published: (2020)
by: Mohd Alias, Mohamad Ridzuan
Published: (2020)
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
by: ‘Asri, Nur Nadia Syahirah
Published: (2017)
by: ‘Asri, Nur Nadia Syahirah
Published: (2017)
Open access books: an international collaboration to explore the practical implications for librarians of increasing access to scholarly research outputs
by: Zhou, Elsie, et al.
Published: (2018)
by: Zhou, Elsie, et al.
Published: (2018)
Efficient XML queries and updates encoding scheme in the presence of access control using fractional numbers
by: Nooshabadi, Meghdad Mirabi
Published: (2013)
by: Nooshabadi, Meghdad Mirabi
Published: (2013)
Open access to scholarly communications: advantages, policy and advocacy
by: FURNIVAL, Ariadne Chloe
Published: (2010)
by: FURNIVAL, Ariadne Chloe
Published: (2010)
Personal identification by Keystroke Pattern for login security
by: Abdullah, Norhayati
Published: (2001)
by: Abdullah, Norhayati
Published: (2001)
DRIVER: Building the Network for Accessing Digital Repositories across Europe
by: Feijen, Martin, et al.
Published: (2007)
by: Feijen, Martin, et al.
Published: (2007)
Public resource or private sanctuary?: access patterns and narratives from the woodland of North East Derbyshire
by: Lisewski-Hobson, Vivyan
Published: (2019)
by: Lisewski-Hobson, Vivyan
Published: (2019)
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
by: Rusli, Julie Roslita
Published: (2011)
by: Rusli, Julie Roslita
Published: (2011)
March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults
by: Mat Isa, Masnita
Published: (2012)
by: Mat Isa, Masnita
Published: (2012)
Mobile agent-based data gathering approaches for static multiple mobile agent itinerary in wireless sensor networks
by: Qadori, Huthiafa Q
Published: (2018)
by: Qadori, Huthiafa Q
Published: (2018)
The Right to Roam: A review of policy and management of public access to land
by: Hughes, Michael, et al.
Published: (2011)
by: Hughes, Michael, et al.
Published: (2011)
The Copyright Amendment (Access Reform) Bill 2021 And Open Access: A Comparative Legal Perspective
by: Koutras, Nikos
Published: (2023)
by: Koutras, Nikos
Published: (2023)
Humanities researchers and open access: Opportunities for Curtin University
by: Quigley, Niamh
Published: (2021)
by: Quigley, Niamh
Published: (2021)
Using New Accessibility Tools to Guide Policy Innovation
by: Curtis, Carey, et al.
Published: (2013)
by: Curtis, Carey, et al.
Published: (2013)
Web-based learning environments for the vision impaired
by: Permvattana, Ruchi, et al.
Published: (2010)
by: Permvattana, Ruchi, et al.
Published: (2010)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
Accessing scientific information
by: Escobedo, Ángel, et al.
Published: (2017)
by: Escobedo, Ángel, et al.
Published: (2017)
The timing and magnitude of Stroop interference and facilitation in monolinguals and bilinguals
by: Coderre, Emily L., et al.
Published: (2013)
by: Coderre, Emily L., et al.
Published: (2013)
An analysis of streaming performance in 3G mobile network / Samsiah Ahmad
by: Ahmad, Samsiah
Published: (2005)
by: Ahmad, Samsiah
Published: (2005)
A framework implementation for information accuracy in mobile commerce / Emafazzila Baharudin
by: Baharudin, Emafazzila
Published: (2007)
by: Baharudin, Emafazzila
Published: (2007)
Channel modeling based on 3-D wave scattering coherent DD EW-RLS and DD NLMS estimation of OFDM-MIMO in wireless communication / Suzi Seroja Sarnin
by: Sarnin, Suzi Seroja
Published: (2018)
by: Sarnin, Suzi Seroja
Published: (2018)
Modified algorithm for image watermarking using 2D-DCT and elgamal cryptosystem / Nur Azien Yazid, Kamilah Abdullah and Suhaila Abd Halim
by: Yazid, Nur Azien, et al.
Published: (2019)
by: Yazid, Nur Azien, et al.
Published: (2019)
Performance evaluation of AODV, DSR and DYMO routing
protocol in MANET / Siti Rahayu Abdul Aziz ... [et al.]
by: Abdul Aziz, Siti Rahayu, et al.
Published: (2008)
by: Abdul Aziz, Siti Rahayu, et al.
Published: (2008)
Hierarchical QoS admission control mechanism for IEEE 802.16j mobile multihop relay WiMAX network / Rohaiza Yusoff
by: Yusoff, Rohaiza
Published: (2014)
by: Yusoff, Rohaiza
Published: (2014)
Time frequency analysis for wireless channel characterization / Zaiton Sharif
by: Sharif, Zaiton
Published: (2015)
by: Sharif, Zaiton
Published: (2015)
Mobile applications at the dentist / Teh Adilla Mustaza, Tong Wah Lim and Siti Mariam Ab. Ghani
by: Mustaza, Teh Adilla, et al.
Published: (2016)
by: Mustaza, Teh Adilla, et al.
Published: (2016)
Performance evaluation of identity-based encryption (IBE) remote attestation protocol in wireless sensor networks / Roszainiza Rosli
by: Rosli, Roszainiza
Published: (2014)
by: Rosli, Roszainiza
Published: (2014)
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
Libraries and open access: the implications of open-access publishing and dissemination for libraries in higher education institutions
by: Pinfield, Stephen
Published: (2007)
by: Pinfield, Stephen
Published: (2007)
Current issues in research communications:
open access and the research economy - 1st report to JISC, March 2010
by: Hubbard, Bill
Published: (2010)
by: Hubbard, Bill
Published: (2010)
Current issues in research communications: open access and institutional benefit - 2nd report to JISC, July 2010
by: Hubbard, Bill, et al.
Published: (2010)
by: Hubbard, Bill, et al.
Published: (2010)
Disability, development and financial exclusion: a study of the socio-economic barriers to accessing microfinance encountered by people with physical disabilities in Kampala, Uganda
by: Hewitt, Joseph
Published: (2018)
by: Hewitt, Joseph
Published: (2018)
Secure role based access control systems using aspect-orientation designing
by: Hazaa, Muneer A., et al.
Published: (2009)
by: Hazaa, Muneer A., et al.
Published: (2009)
Similar Items
-
Enhanced Medium Access Control Protocol for Resolving Node Misbehavior in Wireless Networks
by: Nordin, Noorsalwati
Published: (2007) -
Access control framework in a bring your own device environment
by: Morufu, Olalere
Published: (2016) -
XML-based declarative access control
by: Steele, R., et al.
Published: (2005) -
Toward efficient attribute-based searchable encryption for access control over blockchain
by: Hussein, Al-Abadi Hassan Mansur
Published: (2021) -
A study of campus wireless network technology acceptance among student in UiTM Terengganu, Dungun Campus / Aainaa Abdul Rahim, Nur Izyan Kamaru Zaman and Zaimatul Adawiah Zainuddin
by: Abdul Rahim, Aainaa, et al.
Published: (2012)