DESIGN AND IMPLEMENTATION OF WEB BASED ACCESS CONTROL SYSTEM

Amount: ₦5,000.00 |

Format: Ms Word |

1-5 chapters |




CHAPTER ONE

INTRODUCTION

1.1 Background Of Study

 

A web-based access control system has the technical means to provide remote access control and management. Such a system uses Internet protocols (IP) to communicate signals and data. An IP-based access control system is operable both as a hardwired platform and as a wireless solution Becerik, Jazizadeh, Li, and  Calis. (2004)

Furthermore, a web-based physical access control system provides an additional layer of security by automatically collecting data on all events that occur within the system. You can check the security events log from anywhere and anytime and adjust most of the system’s settings remotely.

Web-based access control system is able to cover entry points located in any part of the world, and can control multiple sites at once Nikolaos Dimakis (2015). A reliable platform enables access control management from a single location using a secure network to control any entry point across the network.

The technological climate is swiftly changing the way we connect and interact with the physical world.  Endless runs of cable and spaghetti wiring is becoming an antiquated notion with the development of wireless internet based equipment.

Access control has always been a top security concern for any establishment.  Whether it means using a lock and key, card reader, or fingerprint, it’s a means by which your business is shielded from unauthorized personnel.  As an integral part of a comprehensive security system, access control mechanisms need to function on the same level as their system counterparts.  Meaning software and technology updates/applications should apply across the board without disrupting the system as a whole R. Salomon, M. Luder, and G. Bieber(2010).  IP (Internet Protocol)/web-based technologies are making the advancement of security system components more attainable and desirable to both end-users and system integrators.  This is evident in the continuing migration from analog based surveillance to IP. Web-based technology is not exclusively transforming surveillance, but security systems as a whole, including access control mechanisms.

It is against this background that the study seeks to give a detailed analysis of the Design and implementation of web based access control system.

 

1.2 Statement of the Problem

Traditional access control approaches have failed so far to consider continuity in ac- cess decision enforcement and to provide the necessary access control infrastructure that facilitates continuity in access policy enforcement and adaptability to unexpected access contexts. Although many basic principles of standard access control models continue to apply in IoT contexts, still it is not clear how to assign the appropriate level of access permissions to resource requestors while there is a degree of uncer- tainty  surrounding the access contexts under which the protected IoT resource can  be accessed. This research provides a dynamic access control framework for IoT en- vironments. The framework provides an adaptive permission assignment technique that adjusts the access control policies based on both proactive and reactive con- textual measures. In addition, the framework provides a responsive access control infrastructure that accommodates potential policy adjustments at run time. The infrastructure integrates an automatic policy specification  that  generates,  on  the fly, context-aware and conflict free access rules, and a continuous policy enforcement

component that keeps pace with changes in access policies as well as access context to maintain authorized access while the resource is in use.

1.3 Aims and Objectives of the Study

This study will base on Design And Implementation Of Web Based Access Control System

The study have the following specific objectives;

  1. To examine the attributes of an effective access control approach for expressing, applying, and continuously enforcing individual’s security and privacy preferences in highly dynamic IoT scenarios
  2. To automate a system that will eliminate the administrative efforts associated with manual management of access control
  3. To examine user’s access patterns and adapt access control policies to unexpected access behaviors

1.4 Significance of the Study

Obviously the design of this window access control system is expected to be a guard to any unauthorized access to computer files without adequate permission from the administrator. It help will the organization to be able to secure their document and files from been access by unknown users. This window access control system will help to restore the clients and organization goodwill’s about keeping their file and relevant document. To some organization or individual who might likely prefer having their document save in the computer will be to relief from fact of fear of sabotage.  The research will go a long way to alleviate the problem fraud in financial industries.  With the advent of this idea or development, files and important document are solely secured.

1.5 Scope of the Study

This research work will concentrate on Design and implementation of web based access control system

.

Limitations of the Study      

Some of the constraints, which made me not to cover this work wide are;

  1. Financial help which I needed most to carry out this project work
  2. Economic uncertainty in the country
  3. No access to materials related to the topic.

 

Definition of Terms

Access: – This way or an opportunity for someone to use something either in a negative or positive way.

Principal: – several measurement techniques used in the life science to gather data for many more variables per sample that the typical number of sample assayed.

Policy: – This is a principal or protocol to guide decision making to achieve rational outcome. A policy is a statement  of intend and implemented as a procedure or protocol.

Security: – This is the protection of information asset through the use of technology, process and training. Is equally the degree of resistance to or protection from harm. It implies to any vulnerable and valuable asset such as person, dwelling, community, nation or organization.

Window: – this is an operating system which is an interface or bridge between computer hardware and software. The hardware is really hard to understand by using the software we made soften the things and forgot about the hardness of the hardware so window is and user friendly interface between computer and

Software: A computer program or set of instructions that direct a computer to perform processing functions.

System: A set of computer components functioning together.

Technology: The study of techniques of mobilizing resources such as information for accomplishing objectives that benefit man and his environment



This material content is developed to serve as a GUIDE for students to conduct academic research


DESIGN AND IMPLEMENTATION OF WEB BASED ACCESS CONTROL SYSTEM

NOT THE TOPIC YOU ARE LOOKING FOR?



A1Project Hub Support Team Are Always (24/7) Online To Help You With Your Project

Chat Us on WhatsApp » 09063590000

DO YOU NEED CLARIFICATION? CALL OUR HELP DESK:

  09063590000 (Country Code: +234)
 
YOU CAN REACH OUR SUPPORT TEAM VIA MAIL: [email protected]


Related Project Topics :

Choose Project Department