User access control and security model

Securing information system becomes the highlight of technology following quick development of computer networking and the Internet. People have known the method to enforce security over a database, but the necessities to get more secure system never reach boundaries. Now days the trend of informati...

Full description

Bibliographic Details
Main Authors: Crysdian, Cahyo (Author), Selamat, Harihodin (Author), Md. Sap, Mohd. Noor (Author)
Format: Article
Language:English
Published: Penerbit UTM Press, 2000-12.
Subjects:
Online Access:Get fulltext