E-store management using bell-lapadula access control security model
Generally, the existing store management system does not provide any access control mechanism in order to manage resources. All levels of user have the same right to access the store and borrow the equipment. Therefore, the E-Store management system using Bell- LaPadula access control model was prop...
| Main Authors: | Roslan, Saidah Nafisah, A Hamid, Isredza Rahmi, Palaniappan, Shamala |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Information Technology Department Politeknik Negeri Padang, Indonesia
2018
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/3875/ http://eprints.uthm.edu.my/3875/1/AJ%202018%20%28371%29.pdf |
Similar Items
Smart home security access system using field programmable gate arrays
by: Saleh, Shukur, et al.
Published: (2018)
by: Saleh, Shukur, et al.
Published: (2018)
Internet Security In China
by: Jia, Xu
Published: (2005)
by: Jia, Xu
Published: (2005)
Key Management For Multicast Security
by: Daw, Win Aye
Published: (2005)
by: Daw, Win Aye
Published: (2005)
Learning Environment For PDA Security
by: Velu , Vengadeshwaran
Published: (2002)
by: Velu , Vengadeshwaran
Published: (2002)
Wireless LAN Access Point Placement Based on User Mobility
by: Taufiq, Muhammad, et al.
Published: (2011)
by: Taufiq, Muhammad, et al.
Published: (2011)
Smart security system for home (IOT)
by: Abd Oun, Muhamed Obed
Published: (2020)
by: Abd Oun, Muhamed Obed
Published: (2020)
Enhancement of network security by use machine learning
by: Hasan, Ahmed Raheem
Published: (2019)
by: Hasan, Ahmed Raheem
Published: (2019)
Youtube spam detection framework using naïve bayes and logistic regression
by: Maulat Samsudin, Nur’Ain, et al.
Published: (2019)
by: Maulat Samsudin, Nur’Ain, et al.
Published: (2019)
Solving security staff scheduling by using genetic algorithm
by: Ang, Shin Yin
Published: (2021)
by: Ang, Shin Yin
Published: (2021)
Web Link Classification And Aceessibillity Modelling For Web Security Enhancement
by: Chong, Chee Way
Published: (1999)
by: Chong, Chee Way
Published: (1999)
Web Link Classification And Aceessibillity Modelling For Web Security Enhancement
by: Chong, Chee Way
Published: (1999)
by: Chong, Chee Way
Published: (1999)
Web transcript verification using check digit as secure number
by: Abd Halim, Muhamad Rais, et al.
Published: (2017)
by: Abd Halim, Muhamad Rais, et al.
Published: (2017)
Internet of things security implementation using blockchain for wireless technology
by: Karim, Karim Jabur
Published: (2019)
by: Karim, Karim Jabur
Published: (2019)
JXME Security: Encryption Overhead In End-To-End J2ME-JXTA Systems
by: Mazlan, Rima
Published: (2008)
by: Mazlan, Rima
Published: (2008)
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancingm Efficiency and Security of VANET
by: JUBAIR, MOHAMMED AHMED, et al.
Published: (2022)
by: JUBAIR, MOHAMMED AHMED, et al.
Published: (2022)
IOT-based solution towards real-time monitoring system for high jump spot
by: Roslan, Muhammad Faris
Published: (2019)
by: Roslan, Muhammad Faris
Published: (2019)
Laser-induced breakdown spectroscopy experimentation and applications
by: Haider, Zuhaib, et al.
Published: (2020)
by: Haider, Zuhaib, et al.
Published: (2020)
The invention of mobile head loss apparatus
by: Abd Rahman, Misbahul Muneer, et al.
Published: (2020)
by: Abd Rahman, Misbahul Muneer, et al.
Published: (2020)
Adaptive MIMO-OFDM combining space-time block codes and spatial multiplexing in correlated frequency-selective channels
by: Halmi, Mohd Hairi
Published: (2005)
by: Halmi, Mohd Hairi
Published: (2005)
Providing Quality Of Service In IEEE 802.11 Wireless Local Area Network (WLAN)
by: Ng, Bryan Cheng Kuan
Published: (2005)
by: Ng, Bryan Cheng Kuan
Published: (2005)
A Case Study Of Redtone International Berhad
by: Mustafa, Muhamad Sabri
Published: (2005)
by: Mustafa, Muhamad Sabri
Published: (2005)
Wavelength Converters Placement In All Optical Networks Using Particle Swarm Optimization
by: Teo , Choon Fang
Published: (2005)
by: Teo , Choon Fang
Published: (2005)
A Case Study Of SOHU
by: Kui, Zhang Wen
Published: (2005)
by: Kui, Zhang Wen
Published: (2005)
Analysis Of Deflection Routing Multihop Lightwave Networks With Limited Number Of Wavelength Converters
by: Koa , Chong Gee
Published: (2005)
by: Koa , Chong Gee
Published: (2005)
Strategic Implications Of Multimedia Messaging Services (MMS) : Identifying The Opportunities
by: Wu, Chin Gang
Published: (2005)
by: Wu, Chin Gang
Published: (2005)
Usability Study Of Websites From The Perspective Of Student Internet Users
by: Jeyakuma, Robert
Published: (2005)
by: Jeyakuma, Robert
Published: (2005)
Analysis And Design Of Active Grating-Embedded Optical Filters
by: Lim , Kian Yong
Published: (2005)
by: Lim , Kian Yong
Published: (2005)
Evaluation Of Internet Protocal Version 6 (IPV6) Implementations And Comparative Performance Analysis On Different Platforms
by: Syed Mohamed, Sulaiman
Published: (2005)
by: Syed Mohamed, Sulaiman
Published: (2005)
Design Of A Multiwavelength Optical Light Source Using Optical Frequency Comb Generator (OFCG)
by: Thum , Ann
Published: (2005)
by: Thum , Ann
Published: (2005)
A Study On Service Convergence Within A Wireless Metropolitan Area Network (MAN) In Malaysia
by: Tan, Roy Yew Hoong
Published: (2005)
by: Tan, Roy Yew Hoong
Published: (2005)
The Preferences Of Mobile Contents Reguired By Consumers And Factory Influencing The Choice Of Mobile Contents By Different Types Of Consumers
by: Xin, Lim Ke
Published: (2004)
by: Xin, Lim Ke
Published: (2004)
Maxis Communications Berhad: Maintaining Dominance In The Malaysian Mobile Communications Industry
by: Abang Zainal Abidin, Dayang Nuryati
Published: (2004)
by: Abang Zainal Abidin, Dayang Nuryati
Published: (2004)
Design And Performance Analysis Of Mobile Data Networks: WLAN-Cellular Wan Interworking
by: Fredson, Alfred Phiri
Published: (2004)
by: Fredson, Alfred Phiri
Published: (2004)
Efficient Call Admission Control Algorithm For CDMA Communication Systems
by: Chan , Mun Leong
Published: (2005)
by: Chan , Mun Leong
Published: (2005)
The Study Of The Adoption Level Of Wireless Local Area Network (WLAN) By Companies In Cyberjaya Malaysia
by: Vooi, Chang Voon
Published: (2004)
by: Vooi, Chang Voon
Published: (2004)
A Case Study Of Haier Group
by: Shu Hong, Wu
Published: (2005)
by: Shu Hong, Wu
Published: (2005)
Pensonic Holding Berhad Strategies To Achieve Competitiveness
by: Lim, Peng Boon
Published: (2005)
by: Lim, Peng Boon
Published: (2005)
Samsung Electronics Corporation Leadership In Diversified Technological Business
by: Chew, Suan Choo
Published: (2005)
by: Chew, Suan Choo
Published: (2005)
Evaluating Usability Theory Of WWW In Malaysia
by: Wan Mohd Isa, Wan Abdul Rahim
Published: (2005)
by: Wan Mohd Isa, Wan Abdul Rahim
Published: (2005)
A Case Study Of Digi.Com Bhd's Value-Delivery Network
by: Khabele, Tiisetso Slyvia
Published: (2004)
by: Khabele, Tiisetso Slyvia
Published: (2004)
Similar Items
-
Smart home security access system using field programmable gate arrays
by: Saleh, Shukur, et al.
Published: (2018) -
Internet Security In China
by: Jia, Xu
Published: (2005) -
Key Management For Multicast Security
by: Daw, Win Aye
Published: (2005) -
Learning Environment For PDA Security
by: Velu , Vengadeshwaran
Published: (2002) -
Wireless LAN Access Point Placement Based on User Mobility
by: Taufiq, Muhammad, et al.
Published: (2011)