Mekanisma Kawalan Capaian Komputer Mikro di Makmal Komputer Berasaskan Kad Pintar

In general, this report covers explanations on four (4) main topics : i) control of usage and PC booking system currently implemented at the labs; ii) basic requirements of the computer security system and its implementation; iii) proposed microcomputer access control mechanism in the lab (Si...

Full description

Saved in:
Bibliographic Details
Main Author: Azman, Ta'a
Format: Thesis
Language:eng
eng
Published: 1999
Subjects:
Online Access:https://etd.uum.edu.my/510/1/AZMAN_TA%27A_-_Mekanisma_kawalan_capaian_komputer_mikro_di_makmal_komputer_berasaskan_kad_pintar.pdf
https://etd.uum.edu.my/510/2/1.AZMAN_TA%27A_-_Mekanisma_kawalan_capaian_komputer_mikro_di_makmal_komputer_berasaskan_kad_pintar.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-uum-etd.510
record_format uketd_dc
institution Universiti Utara Malaysia
collection UUM ETD
language eng
eng
topic QA76 Computer software
spellingShingle QA76 Computer software
Azman, Ta'a
Mekanisma Kawalan Capaian Komputer Mikro di Makmal Komputer Berasaskan Kad Pintar
description In general, this report covers explanations on four (4) main topics : i) control of usage and PC booking system currently implemented at the labs; ii) basic requirements of the computer security system and its implementation; iii) proposed microcomputer access control mechanism in the lab (SisKAWAL); and iv) development of SisKAWAL. Chapter 1 states the problems, the objectives, the scope and the project significance. Chapter 2 details the methodology as well as the hardware and the software used in the system development. Chapter 3 discusses the current system being implemented to manage the use of PCs in the lab. It also details the implementation of the current control of usage and PC booking system. The explanations include the rules and procedures being used, the scope of the system, functions and responsibilities of the lab administrators. Chapter 4 details the system development as well as the proposed control mechanism. This chapter also discusses the basic security requirements and the security features which are explained from the theoretical point of view and research done by certain quarters. Chapter 5 explains the system design for the physical design, input, output, database, interface, object and algorithma based on the technique and methodology of Object Modelling Technique (OMT). Chapter 6 explains the implementation process of the system development used in the programming routines as well as the testing process on the system functions. Apart from that, the conclusion for the whole of the project such as its advantages, disadvantages, limitations and proposals to upgrade the system performance are discussed at the end of this report.
format Thesis
qualification_name masters
qualification_level Master's degree
author Azman, Ta'a
author_facet Azman, Ta'a
author_sort Azman, Ta'a
title Mekanisma Kawalan Capaian Komputer Mikro di Makmal Komputer Berasaskan Kad Pintar
title_short Mekanisma Kawalan Capaian Komputer Mikro di Makmal Komputer Berasaskan Kad Pintar
title_full Mekanisma Kawalan Capaian Komputer Mikro di Makmal Komputer Berasaskan Kad Pintar
title_fullStr Mekanisma Kawalan Capaian Komputer Mikro di Makmal Komputer Berasaskan Kad Pintar
title_full_unstemmed Mekanisma Kawalan Capaian Komputer Mikro di Makmal Komputer Berasaskan Kad Pintar
title_sort mekanisma kawalan capaian komputer mikro di makmal komputer berasaskan kad pintar
granting_institution Universiti Utara Malaysia
granting_department Sekolah Siswazah
publishDate 1999
url https://etd.uum.edu.my/510/1/AZMAN_TA%27A_-_Mekanisma_kawalan_capaian_komputer_mikro_di_makmal_komputer_berasaskan_kad_pintar.pdf
https://etd.uum.edu.my/510/2/1.AZMAN_TA%27A_-_Mekanisma_kawalan_capaian_komputer_mikro_di_makmal_komputer_berasaskan_kad_pintar.pdf
_version_ 1747826932592934912
spelling my-uum-etd.5102013-07-24T12:07:37Z Mekanisma Kawalan Capaian Komputer Mikro di Makmal Komputer Berasaskan Kad Pintar 1999-11-08 Azman, Ta'a Sekolah Siswazah Graduate School QA76 Computer software In general, this report covers explanations on four (4) main topics : i) control of usage and PC booking system currently implemented at the labs; ii) basic requirements of the computer security system and its implementation; iii) proposed microcomputer access control mechanism in the lab (SisKAWAL); and iv) development of SisKAWAL. Chapter 1 states the problems, the objectives, the scope and the project significance. Chapter 2 details the methodology as well as the hardware and the software used in the system development. Chapter 3 discusses the current system being implemented to manage the use of PCs in the lab. It also details the implementation of the current control of usage and PC booking system. The explanations include the rules and procedures being used, the scope of the system, functions and responsibilities of the lab administrators. Chapter 4 details the system development as well as the proposed control mechanism. This chapter also discusses the basic security requirements and the security features which are explained from the theoretical point of view and research done by certain quarters. Chapter 5 explains the system design for the physical design, input, output, database, interface, object and algorithma based on the technique and methodology of Object Modelling Technique (OMT). Chapter 6 explains the implementation process of the system development used in the programming routines as well as the testing process on the system functions. Apart from that, the conclusion for the whole of the project such as its advantages, disadvantages, limitations and proposals to upgrade the system performance are discussed at the end of this report. 1999-11 Thesis https://etd.uum.edu.my/510/ https://etd.uum.edu.my/510/1/AZMAN_TA%27A_-_Mekanisma_kawalan_capaian_komputer_mikro_di_makmal_komputer_berasaskan_kad_pintar.pdf application/pdf eng validuser https://etd.uum.edu.my/510/2/1.AZMAN_TA%27A_-_Mekanisma_kawalan_capaian_komputer_mikro_di_makmal_komputer_berasaskan_kad_pintar.pdf application/pdf eng public masters masters Universiti Utara Malaysia Bhaskar K., Computer Security - Threats And Countermeasures, NCC Blackwell Ltd, 1993. Jeffries M., Smart Card Security Capabilities, 7th Annual Update Development, Applications and Implementation Strategies in Smart Card Technology, 1994. Leonard J., Formal Modelling In A Generalized Framework For Access Control in Proceeding The Computer Security Foundations Workshop III (New Hampshire), June 12-14, 1990, pp.100-114. Bishop M. et al, Goal-Oriented Auditing and Logging, Department of Computer Science University of California, http://seclab.cs,ucdavis.edu/papers.html, (1998). Stair R. M. & Reynolds G. W., Principles of Information Systems - A Managerial Approach, Course Technology, 1998. Glenn & Jaice, A Proof Of Survey For A Network Security Model In Proceeding The Campus Security Foundation Workshop IV (New Hamshire), June 18-20, 1991, pp. 176-181. Projek Akhir MSc. IT (TZ6996) 124 SisKAWAL - Mekanisma Kawalan Capaian PC Makmal Peter & Barry, Windows NT Server 4 in 14 Days (First Edition), Sams Publishing, 1997. Craig & Coletta, Optimizing Client/Server Networks, IDG Books Worldwide, Inc, 1995. Warwick F., Computer Communications Security - Principles, Standard Protocols & Techniques, PTR Prentice Hall, 1994. Deborah et. al, Issues In Descretionary Access Control In Tutorial Computer and Network Security, by Marshall & Harold, IEEE Computer Society Press, 1987. James et. al, Object-Oriented Modelling and Design, Prentice-Hall International Inc, 1991. lrav J., Object-Oriented Software Engineering - A Use Case Driven Approach, Addison - Wesley Publishing Company, 1992. Dietel & Deitel, Visual Basic 6 - How To Program, Prentice Hall Inc., 1999, pp.7 - 10. Curtis & Michael, Database Programming With Visual Basic 6, Sams Publishing, 1999. Microsoft Corporation, Visual Basic Programmer's Guide, Microsoft Corporation, 1991 - 1997. Microsoft Corporation, Microsoft Visual Basic - Language References, Microsoft Corporation, 1995. Earthwey, Accessing The External Functions : The Windows API, http://www.itlibrary.com/library/078971414/d146.htm Mac Millan Chapter Publishing, 1999. C. Dennis, et. al, Object-Oriented System Development, http://gee.cs.osweqo.edu/dl/oosdw3, 1998.