E-Store Management Using Bell-LaPadula Access Control Security Model
DOI: http://dx.doi.org/10.30630/joiv.2.3-2.140
Abstract
Keywords
Full Text:
PDFReferences
Schinagl, S., Paans, R., and Schoon, K. (2016). “The revival of ancient information security models, insight in risks and selection of measures,†Proc. Annu. Hawaii Int. Conf. Syst. Sci., vol. 2016–March, no. 1, pp. 4041–4050, 2016.
Peter, G. (2010). CISSP Guide To Security Essentials. Course Technology, Cengage Learning.
Samson, J. (nda). “Alymta System.†[Online]. Available: http://www.almyta.com/abc_inventory_software.asp.
Viva, M. (2010). “Odoo Inventory System,†[Online]. Available: https://uthm.odoo.com/web#home.
“TradeGecko,†2016. [Online]. Available: https://www.tradegecko.com/producttour/ inventory-control-system.
Neumann, P.G. (2004).“Prototyping,†October, pp. 1–13, 2004.
Neumann, P.G. (2018). Fundamental trustworthiness principles. New Solutions for Cybersecurity.
Ebrahim Abduljalil, D.S., (2017). Multilevel Security Models in Real-Time Database Systems: Comparing and Analyzing. International Journal Of Engineering And Computer Science, 6(3).
Rajpoot, Q.M., Jensen, C.D. and Krishnan, R., (2015), Attributes enhanced role-based access control model. In International Conference on Trust and Privacy in Digital Business (pp. 3-17). Springer, Cham.
Sharma, N.K. and Joshi, A., (2016). Representing attribute based access control policies in owl. In Semantic Computing (ICSC), 2016 IEEE Tenth International Conference on (pp. 333-336).
Giardino, C., Unterkalmsteiner, M., Paternoster, N., Gorschek, T. and Abrahamsson, P., (2014). What do we know about software development in startups?. IEEE software, 31(5), pp.28-32.
Ebrahim Abduljalil, D.S., (2017). Multilevel Security Models in Real-Time Database Systems: Comparing and Analyzing. International Journal Of Engineering And Computer Science, 6(3).