UUM Electronic Theses and Dissertation
UUM ETD | Universiti Utara Malaysian Electronic Theses and Dissertation
FAQs | Feedback | Search Tips | Sitemap

Mekanisma Kawalan Capaian Komputer Mikro di Makmal Komputer Berasaskan Kad Pintar

Azman, Ta'a (1999) Mekanisma Kawalan Capaian Komputer Mikro di Makmal Komputer Berasaskan Kad Pintar. Masters thesis, Universiti Utara Malaysia.

[thumbnail of AZMAN_TA'A_-_Mekanisma_kawalan_capaian_komputer_mikro_di_makmal_komputer_berasaskan_kad_pintar.pdf] PDF
AZMAN_TA'A_-_Mekanisma_kawalan_capaian_komputer_mikro_di_makmal_komputer_berasaskan_kad_pintar.pdf - Submitted Version
Restricted to Registered users only

Download (7MB) | Request a copy
[thumbnail of 1.AZMAN_TA'A_-_Mekanisma_kawalan_capaian_komputer_mikro_di_makmal_komputer_berasaskan_kad_pintar.pdf]
Preview
PDF
1.AZMAN_TA'A_-_Mekanisma_kawalan_capaian_komputer_mikro_di_makmal_komputer_berasaskan_kad_pintar.pdf

Download (787kB) | Preview

Abstract

In general, this report covers explanations on four (4) main topics :
i) control of usage and PC booking system currently implemented at the labs;
ii) basic requirements of the computer security system and its implementation;
iii) proposed microcomputer access control mechanism in the lab (SisKAWAL); and
iv) development of SisKAWAL.
Chapter 1 states the problems, the objectives, the scope and the project significance. Chapter 2 details the methodology as well as the hardware and the software used in the system development. Chapter 3 discusses the current
system being implemented to manage the use of PCs in the lab. It also details the implementation of the current control of usage and PC booking system. The explanations include the rules and procedures being used, the scope of the system, functions and responsibilities of the lab administrators. Chapter 4 details the system development as well as the proposed control mechanism. This
chapter also discusses the basic security requirements and the security features which are explained from the theoretical point of view and research done by certain quarters. Chapter 5 explains the system design for the physical design, input, output, database, interface, object and algorithma based on the technique and methodology of Object Modelling Technique (OMT). Chapter 6 explains the implementation process of the system development used in the programming routines as well as the testing process on the system functions. Apart from that, the conclusion for the whole of the project such as its advantages, disadvantages, limitations and proposals to upgrade the system performance are discussed at the end of this report.

Item Type: Thesis (Masters)
Supervisor : UNSPECIFIED
Item ID: 510
Uncontrolled Keywords: Computer Security System, Usage Control, Microcomputer Access Control
Subjects: Q Science > QA Mathematics > QA76 Computer software
Divisions: Faculty and School System > Sekolah Siswazah
Date Deposited: 20 Oct 2009 01:45
Last Modified: 24 Jul 2013 12:07
Department: Graduate School
URI: https://etd.uum.edu.my/id/eprint/510

Actions (login required)

View Item
View Item