The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).
If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.
Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.
BibTex Citation Data :
@article{JOIV140, author = {Saida Roslan and Isredza A Hamid and Palaniappan Shamala}, title = {E-Store Management Using Bell-LaPadula Access Control Security Model}, journal = {JOIV : International Journal on Informatics Visualization}, volume = {2}, number = {3-2}, year = {2018}, keywords = {Bell-LaPadula , access control security model, E-store, management.}, abstract = {Generally, the existing store management system does not provide any access control mechanism in order to manage resources. All levels of user have the same right to access the store and borrow the equipment. Therefore, the E-Store management system using Bell-LaPadula access control model was proposed. The prototyping methodology was used to develop the system because methodology model is quickly constructed to test or illustrate design features and ideas, in order to gather user feedback. Moreover, the system is built using hypertext processor (PHP) language. The E-Store system has three types of users, which are known as top management of Welding Department, lecturers and students. The user’s access control is divided by high-level privilege to lower-level privilege. Therefore, each user will have different login interface according to their role and access right to the system. Through the system, high-level user manages in and out equipment flow, manages authorization, view history log in activity and verify complaint report. Lower-level user can view list of equipment, report complaint and damage equipment and borrow equipment. The E-Store management system is expected to manage the store effectively and reduced redundancy issues of equipment requested. The user access right has been assigned based on their access level.}, issn = {2549-9904}, pages = {194--198}, doi = {10.30630/joiv.2.3-2.140}, url = {https://joiv.org/index.php/joiv/article/view/140} }
Refworks Citation Data :
@article{{JOIV}{140}, author = {Roslan, S., A Hamid, I., Shamala, P.}, title = {E-Store Management Using Bell-LaPadula Access Control Security Model}, journal = {JOIV : International Journal on Informatics Visualization}, volume = {2}, number = {3-2}, year = {2018}, doi = {10.30630/joiv.2.3-2.140}, url = {} }Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
__________________________________________________________________________
JOIV : International Journal on Informatics Visualization
ISSN 2549-9610 (print) | 2549-9904 (online)
Organized by Department of Information Technology - Politeknik Negeri Padang, and Institute of Visual Informatics - UKM and Soft Computing and Data Mining Centre - UTHM
W : http://joiv.org
E : joiv@pnp.ac.id, hidra@pnp.ac.id, rahmat@pnp.ac.id
View JOIV Stats
is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.