Please use this identifier to cite or link to this item: https://open.uns.ac.rs/handle/123456789/10158
DC FieldValueLanguage
dc.contributor.authorMarkoski, Brankoen
dc.contributor.authorIvankovic Z.en
dc.contributor.authorIvkovic M.en
dc.contributor.authorRadosav, Dragicaen
dc.contributor.authorPecev, Predragen
dc.date.accessioned2020-03-03T14:37:54Z-
dc.date.available2020-03-03T14:37:54Z-
dc.date.issued2011-10-26en
dc.identifier.isbn9781457719745en
dc.identifier.urihttps://open.uns.ac.rs/handle/123456789/10158-
dc.description.abstractThis paper describes fundamental goals and features which one open source, free modular Administrator subsystem should provide. Main goal of entire project was to develop stand-alone administrator subsystem, with complete modular access control and strong data encryption of critical data. FASS (Free Administrator Subsystem) is a downgrade version of Administrator subsystem HEFES 2.0, and contains only its basic features. Features and security aspects of Administrator Subsystem HEFES version 1.0 where published in paper [8], while a paper describing full features of Administrator subsystem HEFES 2.0 will be published in the near future. This paper also describes technologies which were used while developing the administrator system. Data encryption is provided by SHA256 algorithm and TSL security standard. FASS subsystem relies on Java Servlet technology which provides full control over response which is sent from server to a client. Since FASS subsystem also relies on MySQL database service, system security is brought to a new level by developing a set of classes which are designed to stop MySQL injection attacks on the system. Formed classes filter every input data and Query parameters which are transmitted while communicating with servlets. Interface of FASS subsystem was developed in a way so it provides simple and functional access to FASS subsystem, which makes job of a System Administrator much easier, especially in the areas of system maintenance and access rights management through developed ROLE system. Implemented ROLE system has a feature of role inheritance by which, access rules can be inherited from some role, and then modified. This concept was borrowed from Oracle type databases. © 2011 IEEE.en
dc.relation.ispartofSISY 2011 - 9th International Symposium on Intelligent Systems and Informatics, Proceedingsen
dc.titleFeatures and security aspects of FASS subsystemen
dc.typeConference Paperen
dc.identifier.doi10.1109/SISY.2011.6034320en
dc.identifier.scopus2-s2.0-80054814086en
dc.identifier.urlhttps://api.elsevier.com/content/abstract/scopus_id/80054814086en
dc.relation.lastpage194en
dc.relation.firstpage191en
item.grantfulltextnone-
item.fulltextNo Fulltext-
crisitem.author.deptKatedra za informacione tehnologije-
crisitem.author.deptKatedra za informacione tehnologije-
crisitem.author.parentorgTehnički fakultet "Mihajlo Pupin" u Zrenjaninu-
crisitem.author.parentorgTehnički fakultet "Mihajlo Pupin" u Zrenjaninu-
Appears in Collections:TFZR Publikacije/Publications
Show simple item record

Page view(s)

19
Last Week
0
Last month
0
checked on Mar 15, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.