A Novel IT-based Access Management System and Authentication Method

سال انتشار: 1391
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 1,880

فایل این مقاله در 13 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

SASTECH06_067

تاریخ نمایه سازی: 28 مرداد 1391

چکیده مقاله:

Focal point of proposed system is improving electronic access control systems. Regarding to suggested system and method, Clients can apply for their desired access code, which is available for a specific duration using an online booking system. The key/ticket can be printed at home without using any special peripheral equipment. The issued key is recognizable by offline and the standalone lock system. Barcode as a code carrier has been chosen, according to its advantages, such as reduced cost of key production, ease of generating, and it’s highly resistant. The Verifier Machines can be located at each entry point are standalone devices, and are not connected in any way neither between them nor to any central database, server or portal. The system is generally designed for places where some people make use of it of a particular time and location like remote lodgings/hotels, vacation homes, clubs, some departments of factories, parking entrances and so on. Users can create their own access code from anywhere at any time using the online portal. Thanks to proposed encryption / decryption scheme, the system gives a reliable solution to design a method and system for generating access codes and authenticating the key or ticket/coupon with offering a safe and fast way. A prototyped verifier machine is made to validate generated access code. The major contributions of the study are user convenience in making desired key, cost reduction in producing the barcoded-key as well as to empower remote and disconnected lock systems for using the Internet- made keys

نویسندگان

Farhang Padidaran Moghaddam

Department of Industrial Computing, Faculty of Information Science and Technology, National University of Malaysia

Riza Sulaiman

Department of Industrial Computing, Faculty of Information Science and Technology, National University of Malaysia

Mohamed B. Daud

Faculty of Engineering, University Putra Malaysia

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • "sAsrech 2012, Malaysia, Kuala Lumpur. 24-25 March, 2012. Organized by ...
  • Bellare, M., Canetti R, Krawczyk H. (1998). A Modular Approach ...
  • Biham, E. and Shamir, A. (1993). Differential Cryptanalysis of the ...
  • Cayne, A. J., MacAlpine M., Laidlaw C., and Thomas R ...
  • Cheng, M.Y. and Chen, J.C. (2002). Integrating barcode and GIS ...
  • Hendry, M. (2001). "Smart card security and applications. Second edition". ...
  • Hyatt, _ Richard G.; Trent, D., and Hall, Ch. (1998). ...
  • Kucharczyk, D.; Santa F.; Brown S., and Park, M. (2000). ...
  • Lifen H. (1999). Design of Computer Room Management System Based ...
  • Norman, T. (2007). History of Electronic Security, Integrated Security Systems ...
  • Paret, D. (2005). RFID and Contactless _ card applications. John ...
  • Rodriguez, H., Smith, Jr., James N., and Clifford J (2005) ...
  • Schneier B. (1996). Applied Cryptography , John Wiley & Sons ...
  • Milgate A. (2006). Identity and Access Management , http : ...
  • "sAsrech 2012, Malaysia, Kuala Lumpur. 24-25 March, 2012. Organized by ...
  • Wen-Yuan Chen (2008). Multip le -watermarking scheme of the European ...
  • نمایش کامل مراجع