Mekanisma Kawalan Capaian Komputer Mikro di Makmal Komputer Berasaskan Kad Pintar
In general, this report covers explanations on four (4) main topics : i) control of usage and PC booking system currently implemented at the labs; ii) basic requirements of the computer security system and its implementation; iii) proposed microcomputer access control mechanism in the lab (Si...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | eng eng |
Published: |
1999
|
Subjects: | |
Online Access: | https://etd.uum.edu.my/510/1/AZMAN_TA%27A_-_Mekanisma_kawalan_capaian_komputer_mikro_di_makmal_komputer_berasaskan_kad_pintar.pdf https://etd.uum.edu.my/510/2/1.AZMAN_TA%27A_-_Mekanisma_kawalan_capaian_komputer_mikro_di_makmal_komputer_berasaskan_kad_pintar.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-uum-etd.510 |
---|---|
record_format |
uketd_dc |
institution |
Universiti Utara Malaysia |
collection |
UUM ETD |
language |
eng eng |
topic |
QA76 Computer software |
spellingShingle |
QA76 Computer software Azman, Ta'a Mekanisma Kawalan Capaian Komputer Mikro di Makmal Komputer Berasaskan Kad Pintar |
description |
In general, this report covers explanations on four (4) main topics :
i) control of usage and PC booking system currently implemented at the labs;
ii) basic requirements of the computer security system and its implementation;
iii) proposed microcomputer access control mechanism in the lab (SisKAWAL); and
iv) development of SisKAWAL.
Chapter 1 states the problems, the objectives, the scope and the project significance. Chapter 2 details the methodology as well as the hardware and the software used in the system development. Chapter 3 discusses the current
system being implemented to manage the use of PCs in the lab. It also details the implementation of the current control of usage and PC booking system. The explanations include the rules and procedures being used, the scope of the system, functions and responsibilities of the lab administrators. Chapter 4 details the system development as well as the proposed control mechanism. This
chapter also discusses the basic security requirements and the security features which are explained from the theoretical point of view and research done by certain quarters. Chapter 5 explains the system design for the physical design, input, output, database, interface, object and algorithma based on the technique and methodology of Object Modelling Technique (OMT). Chapter 6 explains the implementation process of the system development used in the programming routines as well as the testing process on the system functions. Apart from that, the conclusion for the whole of the project such as its advantages, disadvantages, limitations and proposals to upgrade the system performance are discussed at the end of this report.
|
format |
Thesis |
qualification_name |
masters |
qualification_level |
Master's degree |
author |
Azman, Ta'a |
author_facet |
Azman, Ta'a |
author_sort |
Azman, Ta'a |
title |
Mekanisma Kawalan Capaian Komputer Mikro di Makmal Komputer Berasaskan Kad Pintar |
title_short |
Mekanisma Kawalan Capaian Komputer Mikro di Makmal Komputer Berasaskan Kad Pintar |
title_full |
Mekanisma Kawalan Capaian Komputer Mikro di Makmal Komputer Berasaskan Kad Pintar |
title_fullStr |
Mekanisma Kawalan Capaian Komputer Mikro di Makmal Komputer Berasaskan Kad Pintar |
title_full_unstemmed |
Mekanisma Kawalan Capaian Komputer Mikro di Makmal Komputer Berasaskan Kad Pintar |
title_sort |
mekanisma kawalan capaian komputer mikro di makmal komputer berasaskan kad pintar |
granting_institution |
Universiti Utara Malaysia |
granting_department |
Sekolah Siswazah |
publishDate |
1999 |
url |
https://etd.uum.edu.my/510/1/AZMAN_TA%27A_-_Mekanisma_kawalan_capaian_komputer_mikro_di_makmal_komputer_berasaskan_kad_pintar.pdf https://etd.uum.edu.my/510/2/1.AZMAN_TA%27A_-_Mekanisma_kawalan_capaian_komputer_mikro_di_makmal_komputer_berasaskan_kad_pintar.pdf |
_version_ |
1747826932592934912 |
spelling |
my-uum-etd.5102013-07-24T12:07:37Z Mekanisma Kawalan Capaian Komputer Mikro di Makmal Komputer Berasaskan Kad Pintar 1999-11-08 Azman, Ta'a Sekolah Siswazah Graduate School QA76 Computer software In general, this report covers explanations on four (4) main topics : i) control of usage and PC booking system currently implemented at the labs; ii) basic requirements of the computer security system and its implementation; iii) proposed microcomputer access control mechanism in the lab (SisKAWAL); and iv) development of SisKAWAL. Chapter 1 states the problems, the objectives, the scope and the project significance. Chapter 2 details the methodology as well as the hardware and the software used in the system development. Chapter 3 discusses the current system being implemented to manage the use of PCs in the lab. It also details the implementation of the current control of usage and PC booking system. The explanations include the rules and procedures being used, the scope of the system, functions and responsibilities of the lab administrators. Chapter 4 details the system development as well as the proposed control mechanism. This chapter also discusses the basic security requirements and the security features which are explained from the theoretical point of view and research done by certain quarters. Chapter 5 explains the system design for the physical design, input, output, database, interface, object and algorithma based on the technique and methodology of Object Modelling Technique (OMT). Chapter 6 explains the implementation process of the system development used in the programming routines as well as the testing process on the system functions. Apart from that, the conclusion for the whole of the project such as its advantages, disadvantages, limitations and proposals to upgrade the system performance are discussed at the end of this report. 1999-11 Thesis https://etd.uum.edu.my/510/ https://etd.uum.edu.my/510/1/AZMAN_TA%27A_-_Mekanisma_kawalan_capaian_komputer_mikro_di_makmal_komputer_berasaskan_kad_pintar.pdf application/pdf eng validuser https://etd.uum.edu.my/510/2/1.AZMAN_TA%27A_-_Mekanisma_kawalan_capaian_komputer_mikro_di_makmal_komputer_berasaskan_kad_pintar.pdf application/pdf eng public masters masters Universiti Utara Malaysia Bhaskar K., Computer Security - Threats And Countermeasures, NCC Blackwell Ltd, 1993. Jeffries M., Smart Card Security Capabilities, 7th Annual Update Development, Applications and Implementation Strategies in Smart Card Technology, 1994. Leonard J., Formal Modelling In A Generalized Framework For Access Control in Proceeding The Computer Security Foundations Workshop III (New Hampshire), June 12-14, 1990, pp.100-114. Bishop M. et al, Goal-Oriented Auditing and Logging, Department of Computer Science University of California, http://seclab.cs,ucdavis.edu/papers.html, (1998). Stair R. M. & Reynolds G. W., Principles of Information Systems - A Managerial Approach, Course Technology, 1998. Glenn & Jaice, A Proof Of Survey For A Network Security Model In Proceeding The Campus Security Foundation Workshop IV (New Hamshire), June 18-20, 1991, pp. 176-181. Projek Akhir MSc. IT (TZ6996) 124 SisKAWAL - Mekanisma Kawalan Capaian PC Makmal Peter & Barry, Windows NT Server 4 in 14 Days (First Edition), Sams Publishing, 1997. Craig & Coletta, Optimizing Client/Server Networks, IDG Books Worldwide, Inc, 1995. Warwick F., Computer Communications Security - Principles, Standard Protocols & Techniques, PTR Prentice Hall, 1994. Deborah et. al, Issues In Descretionary Access Control In Tutorial Computer and Network Security, by Marshall & Harold, IEEE Computer Society Press, 1987. James et. al, Object-Oriented Modelling and Design, Prentice-Hall International Inc, 1991. lrav J., Object-Oriented Software Engineering - A Use Case Driven Approach, Addison - Wesley Publishing Company, 1992. Dietel & Deitel, Visual Basic 6 - How To Program, Prentice Hall Inc., 1999, pp.7 - 10. Curtis & Michael, Database Programming With Visual Basic 6, Sams Publishing, 1999. Microsoft Corporation, Visual Basic Programmer's Guide, Microsoft Corporation, 1991 - 1997. Microsoft Corporation, Microsoft Visual Basic - Language References, Microsoft Corporation, 1995. Earthwey, Accessing The External Functions : The Windows API, http://www.itlibrary.com/library/078971414/d146.htm Mac Millan Chapter Publishing, 1999. C. Dennis, et. al, Object-Oriented System Development, http://gee.cs.osweqo.edu/dl/oosdw3, 1998. |