User access control and security model

Securing information system becomes the highlight of technology following quick development of computer networking and the Internet. People have known the method to enforce security over a database, but the necessities to get more secure system never reach boundaries. Now days the trend of informati...

Full description

Bibliographic Details
Main Authors: Crysdian, Cahyo (Author), Selamat, Harihodin (Author), Md. Sap, Mohd. Noor (Author)
Format: Article
Language:English
Published: Penerbit UTM Press, 2000-12.
Subjects:
Online Access:Get fulltext
LEADER 01761 am a22001573u 4500
001 8712
042 |a dc 
100 1 0 |a Crysdian, Cahyo  |e author 
700 1 0 |a Selamat, Harihodin  |e author 
700 1 0 |a Md. Sap, Mohd. Noor  |e author 
245 0 0 |a User access control and security model 
260 |b Penerbit UTM Press,   |c 2000-12. 
856 |z Get fulltext  |u http://eprints.utm.my/id/eprint/8712/1/HarihodinSelamat2000_UserAccessControlAndSecurity.pdf 
520 |a Securing information system becomes the highlight of technology following quick development of computer networking and the Internet. People have known the method to enforce security over a database, but the necessities to get more secure system never reach boundaries. Now days the trend of information system is the open connection system where users are able to access system from many places. It leads the involvement of user access control as a part of database security since it takes a big role in governing access request of each user. This security component serves as a part of defense to secure data contained in the system. Development of user access control began on the early of seventies with DAC technology. Right now technology of user access control has reached sophisticated method with RBAC, but development of organization using information system and the development of information system itself push the improvement of user access control technology. This paper provides information about security system with the emphasis on user access control, which includes DAC, MAC and RBAC and the implementation of each user access control in security model. Comparison of each user access control method is given at the end of the paper. 
546 |a en 
650 0 4 |a QA75 Electronic computers. Computer science