User access control and security model
Securing information system becomes the highlight of technology following quick development of computer networking and the Internet. People have known the method to enforce security over a database, but the necessities to get more secure system never reach boundaries. Now days the trend of informati...
| Main Authors: | Crysdian, Cahyo, Selamat, Harihodin, Md. Sap, Mohd. Noor |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Penerbit UTM Press
2000
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/8712/ http://eprints.utm.my/8712/1/HarihodinSelamat2000_UserAccessControlAndSecurity.pdf |
Similar Items
The application of watershed and region merging for image segmentation.
by: Cahyo Crysdian, Cahyo Crysdian, et al.
Published: (2001)
by: Cahyo Crysdian, Cahyo Crysdian, et al.
Published: (2001)
A binary access control scheme with high data security.
by: Islam, Md. Rafiqul, et al.
Published: (2002)
by: Islam, Md. Rafiqul, et al.
Published: (2002)
Segmenting medical images using mathematical morphology and the improved watershed transform.
by: Cahyo Crysdian, Cahyo Crysdian, et al.
Published: (2001)
by: Cahyo Crysdian, Cahyo Crysdian, et al.
Published: (2001)
A model for controlling access to XML documents.
by: Rahman, Kh. Azizur, et al.
Published: (2003)
by: Rahman, Kh. Azizur, et al.
Published: (2003)
A universal relation approach for natural query in logic database system
by: Selamat, Harihodin
Published: (1992)
by: Selamat, Harihodin
Published: (1992)
The integration of spatial and non-spatial data model
by: Daman, Daut, et al.
Published: (2000)
by: Daman, Daut, et al.
Published: (2000)
Secure Cloud Storage with a Sanitizable Access Control System Again Malicious Data Publisher
by: Alfiya Khanum, R.M., et al.
Published: (2024)
by: Alfiya Khanum, R.M., et al.
Published: (2024)
Modelling kernel methods for unsupervised learning of micro array data
by: Md. Sap, Mohd. Noor
Published: (2008)
by: Md. Sap, Mohd. Noor
Published: (2008)
Users' perception of the information security policy at Universiti Teknologi Malaysia
by: Sharif, Haniza
Published: (2009)
by: Sharif, Haniza
Published: (2009)
Anomaly network intrusion detection method in network security based on principle component analysis
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Financial time series representation using multiresolution important point retrieval method
by: Phetking, Chaliaw, et al.
Published: (2008)
by: Phetking, Chaliaw, et al.
Published: (2008)
Common Sub-Expression Identification Strategy for MQO
by: Zakaria, Nor Hawaniah, et al.
Published: (2006)
by: Zakaria, Nor Hawaniah, et al.
Published: (2006)
Adaptive Concurrent Medium Access Control for Wireless Mesh Network
by: Ibrahim, Mohd Sufiz, et al.
Published: (2010)
by: Ibrahim, Mohd Sufiz, et al.
Published: (2010)
A new tv-based database encryption scheme using ts block cipher
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
Electronic dictionary production system (EDIPS)
by: Harihodin, Hezul Hezry
Published: (2006)
by: Harihodin, Hezul Hezry
Published: (2006)
Security awareness: A lesson from Tcpdump and Ethereal
by: Rohani, Mohd. Fo’ad, et al.
Published: (2005)
by: Rohani, Mohd. Fo’ad, et al.
Published: (2005)
On the medium access control protocols suitable for wireless sensor networks – a survey
by: Guerroumi, Mohamed, et al.
Published: (2014)
by: Guerroumi, Mohamed, et al.
Published: (2014)
Analyzing the periocular biometric-based access control systems
by: Mon, Chit Su, et al.
Published: (2020)
by: Mon, Chit Su, et al.
Published: (2020)
Teknik pengoptimuman jadual gabungan kesamaan bagi data bersandarkan masa
by: Kurmin, Norazrin, et al.
Published: (2005)
by: Kurmin, Norazrin, et al.
Published: (2005)
Conceptual Design Of Biodiversity Data Model (BiDaM) Using
Object Relational And Event Based Approach
by: Kamruzzaman, A. Z. M., et al.
Published: (2005)
by: Kamruzzaman, A. Z. M., et al.
Published: (2005)
Dynamic user-defined access control policies via programming language / Suzana Ahmad
by: Ahmad, Suzana
Published: (2018)
by: Ahmad, Suzana
Published: (2018)
Predictive data mining based on similarity and clustering methods.
by: Defit, Sarjon, et al.
Published: (2000)
by: Defit, Sarjon, et al.
Published: (2000)
Data mining and e-commerce : methods, applications, and challenges
by: Rastegari, Hamid, et al.
Published: (2008)
by: Rastegari, Hamid, et al.
Published: (2008)
Mining association rule from large databases.
by: Defit, Sarjon, et al.
Published: (2001)
by: Defit, Sarjon, et al.
Published: (2001)
A predictive approach to improve a fault tolerance confidence level on grid resources scheduling
by: Bouyer, Asgarali, et al.
Published: (2008)
by: Bouyer, Asgarali, et al.
Published: (2008)
Application of kohonen neural network and rough approximation for overlapping clusters optimization
by: Mohebi, E., et al.
Published: (2008)
by: Mohebi, E., et al.
Published: (2008)
Hybrid self organizing map for overlapping clusters
by: Md. Sap, Mohd. Noor, et al.
Published: (2008)
by: Md. Sap, Mohd. Noor, et al.
Published: (2008)
Culture and user-interface design for older users in Malaysia
by: Hisham, Syariffanor, et al.
Published: (2007)
by: Hisham, Syariffanor, et al.
Published: (2007)
Dual Access Control for Cloud Storage and Sharing
by: Sandeep, T.S., et al.
Published: (2024)
by: Sandeep, T.S., et al.
Published: (2024)
Online securities trading and control of securities offences in Malaysia
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
Online securities trading and control of securities offences in Malaysia
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
Outlier Detection Technique in Data Mining: A Research Perspective
by: Mansur, M. O., et al.
Published: (2005)
by: Mansur, M. O., et al.
Published: (2005)
Clustering Spatial Data Using a Kernel-Based Algorithm
by: Awan, A. Majid, et al.
Published: (2005)
by: Awan, A. Majid, et al.
Published: (2005)
Classification with degree of importance of attributes for stock market data mining
by: Khokhar, Rashid Hafeez, et al.
Published: (2004)
by: Khokhar, Rashid Hafeez, et al.
Published: (2004)
An intelligent system based on kernel methods for crop yield prediction
by: Majid Awan, A., et al.
Published: (2006)
by: Majid Awan, A., et al.
Published: (2006)
Finding spatio-temporal patterns in climate data using clustering
by: Md. Sap, Mohd. Noor, et al.
Published: (2005)
by: Md. Sap, Mohd. Noor, et al.
Published: (2005)
Development of an intelligent prediction tool for rice yield based on machine learning techniques
by: Md. Sap, Mohd. Noor, et al.
Published: (2006)
by: Md. Sap, Mohd. Noor, et al.
Published: (2006)
Development of a compact linguistic rules-tree (CLR-Tree) : the first phase.
by: Khokhar, Rashid Hafeez, et al.
Published: (2003)
by: Khokhar, Rashid Hafeez, et al.
Published: (2003)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
Enhancing generic code clone detection model through protected access modifier rule and weightage
by: Siti An Nasihah, Mohd Napi
Published: (2016)
by: Siti An Nasihah, Mohd Napi
Published: (2016)
Similar Items
-
The application of watershed and region merging for image segmentation.
by: Cahyo Crysdian, Cahyo Crysdian, et al.
Published: (2001) -
A binary access control scheme with high data security.
by: Islam, Md. Rafiqul, et al.
Published: (2002) -
Segmenting medical images using mathematical morphology and the improved watershed transform.
by: Cahyo Crysdian, Cahyo Crysdian, et al.
Published: (2001) -
A model for controlling access to XML documents.
by: Rahman, Kh. Azizur, et al.
Published: (2003) -
A universal relation approach for natural query in logic database system
by: Selamat, Harihodin
Published: (1992)