Secure software architecture approach for role-based access control using aspect-oriented design
Organizations define and enforce AC policies to protect sensitive information resources. The policy imposes requirements to ensure that only authorized users have access to the sensitive information resources. Normally, systems for various applications operate with different access control requireme...
Saved in:
Main Author: | Saeed Hazaa, Muneer Abdullah |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2010
|
Subjects: | |
Online Access: | http://psasir.upm.edu.my/id/eprint/70802/1/FSKTM%202010%2011%20UPMIR.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Role-based access contorol in ERP : sales and distrubution system /
by: Hor, Li Peng
Published: (2002) -
Medium access control and transmission scheduling in multicode-CDMA networks /
by: Kong, Peng Yong
Published: (2001) -
Enhanced Medium Access Control Protocol for Resolving Node Misbehavior in Wireless Networks
by: Nordin, Noorsalwati
Published: (2007) -
Access control framework in a bring your own device environment
by: Morufu, Olalere
Published: (2016) -
Personal identification by Keystroke Pattern for login security
by: Abdullah, Norhayati
Published: (2001)