<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns="http://purl.org/rss/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/3708">
    <title>UCSC Digital Library Collection:</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/3708</link>
    <description />
    <items>
      <rdf:Seq>
        <rdf:li rdf:resource="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/3822" />
        <rdf:li rdf:resource="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/3812" />
        <rdf:li rdf:resource="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/3792" />
        <rdf:li rdf:resource="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/3767" />
      </rdf:Seq>
    </items>
    <dc:date>2026-04-30T22:30:19Z</dc:date>
  </channel>
  <item rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/3822">
    <title>Secure tool for Map data sharing</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/3822</link>
    <description>Title: Secure tool for Map data sharing
Authors: Logendra, E.
Abstract: Mapping and analysis of geographic information is becoming increasingly essential in critical strategic decision making and it is significantly amplified in various Industries. The requirement of securely sharing such Geo intelligence data with multiple management personnel to stem vital business decisions has drastically increased in today’s Business World. There are many Geographical Information Systems (GIS) software out in the market to perform analysis in numerous ways but lacking in security or inadequate in design. This thesis primarily develops a secure tool for such GIS software, called MapInfo Professional from Pitney Bowes, to perform adequate security measures in order to protect the business critical information.</description>
    <dc:date>2016-11-17T00:00:00Z</dc:date>
  </item>
  <item rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/3812">
    <title>Dynamic and Temporal Control of Role Based Access for On-Demand Role Assignment</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/3812</link>
    <description>Title: Dynamic and Temporal Control of Role Based Access for On-Demand Role Assignment
Authors: Fernando, S. P. R. D.
Abstract: The computer systems security, role-based access control (RBAC) is an approach to control user access to a system. It is used by a majority of enterprises. Within an organization, roles are created based on various job functions. The permissions to achieve certain operations are assigned to specific roles. Members or staffs are assigned particular roles, and through these role assignments they acquire the computer permissions to perform particular computer-system functions. Since users are not assigned permissions directly, but only acquire them through their role/s, management of individual user rights becomes a matter of simply assigning appropriate roles to the user's account; this streamlines common operations, such as adding a user, or changing a user's department. Depend on the organizational structure; user’s roles are different from each other. In generally high level users (supervisors) having more privilege roles than lower level users (subordinates). In practice some time supervisors are willing to temporary grant their role/s to subordinates to performed particular tasks due to unavailability of the supervisor. Those are unplanned requirements of an organization.   In the event the  supervisor is not available and  has to transfer his user account information like username &amp; password, this may lead to the subordinate getting all permission which belonged to the Supervisor instead of getting one or more particular permission/s.  This may lead to the probability of misusing of authorities given to him.  As a result the accountability of the incident is blamed on the Supervisor.  Another opening of giving the password /username would be him/her getting an impression of the pattern of the Supervisors password /username and also forgetting to reset supervisors’ password by Supervisor, will allowing to access the system without supervisor awareness.  This research focuses on developing a system to facilitate non-administrative top level users to temporarily assign access permission to their subordinates to perform particular tasks for a limited period of time with control of administrator predefined rules.  Assignment of roles for a specific period of time by a supervisor to the subordinates would be a valuable facility for most systems.</description>
    <dc:date>2016-11-16T00:00:00Z</dc:date>
  </item>
  <item rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/3792">
    <title>eCommerce System for Negotiable Bill of Lading and Flexible Payment Options</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/3792</link>
    <description>Title: eCommerce System for Negotiable Bill of Lading and Flexible Payment Options
Authors: Tharaka, M.H.S.
Abstract: Documentation plays a vital role in the international trade. In the seaborne trade transactions there are several documents being manipulated. Bill of Lading is the key document utilized in the international trade which acts as document of receipt for cargo, evidence for contract between shipper and the carrier and importantly a document of title. Paper document processing is extremely  labor and cost intensive and also they can be easily forged and also there is no confidentiality hence there exist a risk of trade secrets being revealed. Due to those reasons the international trade research groups have tried to develop electronic platform for handling international trade transactions.There were four major attempts have been identified as SEADOCS,@GlobalTrade, Bolero and TradeCard  with their associated uniqueness. Anyway the adaptation towards electronic implementations were unexpectedly slower in history. UNCTAD’s expert group has researched on the issues associated with the utilization delay and they have highlighted the negotiation function of the Bill of Lading is mostly utilized in the international trade and apparently none of the above solutions directly supportive to negotiation function with required conveniences in the international trade. Hence the research has been focussed  thoroughly on the implementation of  eCommerce system with negotiable Bill of Lading function including flexibility in payment negotiation as well as to ensure integrity with non repudiation and confidentiality as required. The solution was named as SecureTransit which has been bundled with the features required for future world for international trade automation. The new solution has been called as SecureTransit product name hereafter.</description>
    <dc:date>2016-09-28T00:00:00Z</dc:date>
  </item>
  <item rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/3767">
    <title>Secure Information Sharing in a Collaboration Oriented Architecture</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/3767</link>
    <description>Title: Secure Information Sharing in a Collaboration Oriented Architecture
Authors: Boteju, A.J.
Abstract: In many critical real life applications information sharing confidentially in a collaborative environment has always been problematic. In today’s world which is driven by data and processed information, where information plays a highly critical role when it comes strategic decisions making and planning future organizational strategies, solid security architecture for information shared between multiple entities has become a highly critical factor and processing of those information and the security of those information has become a necessity.Currently third party developed applications been used to share critical information in most of the organizational structures but the level of trust that must be placed in those applications is often inadvisable and undesirable. This has been age old problem many solutions has been prevailed on this subject but little less known when it comes to confidential information sharing in collaborative environment which connects the physical world with the digital world. In this thesis we explore reliable techniques for distributed information sharing that are efficient, secure, and applicable to many situations.In a world that all most all the aspects are managed through digital technology, security of the information is very critical. Confidentiality, integrity, availability and accountability of information has become a necessity with rise of the cyber warfare.This research describes a way to share information and data in an open and collaborative environment with near perfect security.</description>
    <dc:date>2016-09-22T00:00:00Z</dc:date>
  </item>
</rdf:RDF>

