SlideShare a Scribd company logo
1 of 12
Distributed system for access control to physical
resources based on qualifications
BY :-Darshan Vithani
ME-CSE-1st SEM

1 of 12
Contents
 Introduction

 Structure of the distributed system
 Further research
 Conclusion

Access Control to Physical Resources

2 of 12
Introduction
 In nowadays society, the computer system attacks
are real threats, and terms as: hacker, SPAM,
phishing, cyber terrorism are heard very often.
 Distributed system required to implement a new
method for the access control to physical resources,
based on qualifications.
 The controlled access to resources plays a more and
more important role.
These ones, along with other methods (e.g.
Cryptography, Firewall)
Access Control to Physical Resources

3 of 12
Introduction
 We present a model of access control to physical
resources, based on qualifications that can be
obtained through a learning process.
 Grant to employees of a company the possibility to
access the inputs of certain machines (protected
objects), according to the qualifications

Access Control to Physical Resources

4 of 12
Structure of the distributed system
 Internet offering to the employees either the access
to secured networks (from distance) or the
possibility to control, by Internet, certain industrial
processes.
 We used PLC (Programmable Logic Controller) at
controller level
By this Controls Equipment by remote location like
Home Automation , CCTV Camera , ATM Machine,
Reservation & E-learning

Access Control to Physical Resources

5 of 12
Access Control Model

Access Control to Physical Resources

6 of 12
Database for Machine

Access Control to Physical Resources

7 of 12
Web Application to Controls Machine

Access Control to Physical Resources

8 of 12
Further Research
The server level algorithms and the PLC are
generalized created, for the “n” machine, but for
testing at the hardware level we used only one test
machine and one PLC with the modules: RFID
interface, Inputs, Outputs, Ethernet
 In the same time, further developments shall be
realized on the security part, where certain
improvements are required, e.g. to secure the Web
Service with digital signatures.

Access Control to Physical Resources

9 of 12
Conclusion
In this implementation model of the access control
to physical resources, based on qualifications.
The advantage of this model is integration of the
qualifications in the authorization process helps us
in the human resources process

Access Control to Physical Resources

10 of 12
References
[1] Robert Richardson, CSI Director, 2008 - CSI Computer Crime & Security Survey, available
online: http://www.cse.msstate.edu
[2] Cristea Daniela, Octavian Prostean, Thomas Muschalik and Tirian Ovidiu, An access control
pattern based on qualifications to grant access to physic resources, The 3rd European DAAAM
International Young Researchers and Scientists Conference 25-28th, Vienna, Austria 2009,
ISBN 978-3-901509-70-4, pp. 1765 – 1766
[3] Markus Schumacher, Eduardo Fernandez- Buglioni, Duane Hybertson, Frank Buschmann
and Peter Sommerland, Security Patterns Integrating Security and Systems Engineering, John
Wiley & Sons, Ltd, 2006, ISBN: 0-470- 85884-2.
[4] Fernandez, E.; Ballesteros, J.; Desouza-Doucet, A. & Larrondo-Petrie, D. (2007). Security
Patterns for Physical Access Control Systems, in: Data and applications security XXI, Barker, k.
& Ahn, G. (Eds), 259-274, Springer, ISBN: 978-3540735335, Germany
[5] Martin Raepple, The Developer’s Guide to SAP NetWeaver Security, SAP Press, ISBN 9781- 59229-180-9
[6] Gellert Ulrich and Cristea Daniela, Web Dynpro ABAP for Practitioners, Springer, 2010,
ISBN 978-3-642-11386-4

Access Control to Physical Resources

11 of 12
Thanks You
12 of 12

More Related Content

What's hot

Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
Louie Medinaceli
 
Security management and tools
Security management and toolsSecurity management and tools
Security management and tools
Vibhor Raut
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
Arber Hoxhallari
 
Data and database security and controls
Data and database security and controlsData and database security and controls
Data and database security and controls
FITSFSd
 
CSEC630_TeamAssignment_TeamBlazer_FINAL
CSEC630_TeamAssignment_TeamBlazer_FINALCSEC630_TeamAssignment_TeamBlazer_FINAL
CSEC630_TeamAssignment_TeamBlazer_FINAL
Ronald Jackson, Jr
 
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for womenE content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
Abiramis19
 

What's hot (20)

Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
CYBER SECURITY audit course report
CYBER SECURITY audit course reportCYBER SECURITY audit course report
CYBER SECURITY audit course report
 
Security
SecuritySecurity
Security
 
Security management and tools
Security management and toolsSecurity management and tools
Security management and tools
 
Principles and risk assessment of managing distributed ontologies hosted by e...
Principles and risk assessment of managing distributed ontologies hosted by e...Principles and risk assessment of managing distributed ontologies hosted by e...
Principles and risk assessment of managing distributed ontologies hosted by e...
 
Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
Dstca
DstcaDstca
Dstca
 
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
 
Data and database security and controls
Data and database security and controlsData and database security and controls
Data and database security and controls
 
Database Security - IK
Database Security - IKDatabase Security - IK
Database Security - IK
 
CSEC630_TeamAssignment_TeamBlazer_FINAL
CSEC630_TeamAssignment_TeamBlazer_FINALCSEC630_TeamAssignment_TeamBlazer_FINAL
CSEC630_TeamAssignment_TeamBlazer_FINAL
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
User centric machine learning for cyber security operation center
User centric machine learning for cyber security operation centerUser centric machine learning for cyber security operation center
User centric machine learning for cyber security operation center
 
Cis 349 Exceptional Education-snaptutorial.com
Cis 349 Exceptional Education-snaptutorial.comCis 349 Exceptional Education-snaptutorial.com
Cis 349 Exceptional Education-snaptutorial.com
 
Data Mining Techniques for Providing Network Security through Intrusion Detec...
Data Mining Techniques for Providing Network Security through Intrusion Detec...Data Mining Techniques for Providing Network Security through Intrusion Detec...
Data Mining Techniques for Providing Network Security through Intrusion Detec...
 
Jb ia
Jb   iaJb   ia
Jb ia
 
Secure Your Career Shift With Computer-Security Training
Secure Your Career Shift With Computer-Security TrainingSecure Your Career Shift With Computer-Security Training
Secure Your Career Shift With Computer-Security Training
 
Metric for Evaluating Availability of an Information System : A Quantitative ...
Metric for Evaluating Availability of an Information System : A Quantitative ...Metric for Evaluating Availability of an Information System : A Quantitative ...
Metric for Evaluating Availability of an Information System : A Quantitative ...
 
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for womenE content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
 

Similar to Distributed system for access control to physical resources based on qualifications

IN-DEPTH ANALYSIS AND SYSTEMATIC LITERATURE REVIEW ON RISK BASED ACCESS CONTR...
IN-DEPTH ANALYSIS AND SYSTEMATIC LITERATURE REVIEW ON RISK BASED ACCESS CONTR...IN-DEPTH ANALYSIS AND SYSTEMATIC LITERATURE REVIEW ON RISK BASED ACCESS CONTR...
IN-DEPTH ANALYSIS AND SYSTEMATIC LITERATURE REVIEW ON RISK BASED ACCESS CONTR...
ijcseit
 
Include at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inInclude at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words in
maribethy2y
 
Implementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control PlanImplementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control Plan
Angie Willis
 
Vulnerabilities detection using attack recognition technique in multi-factor ...
Vulnerabilities detection using attack recognition technique in multi-factor ...Vulnerabilities detection using attack recognition technique in multi-factor ...
Vulnerabilities detection using attack recognition technique in multi-factor ...
TELKOMNIKA JOURNAL
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management Act
Michelle Singh
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
Christopher Nanchengwa
 
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
CSCJournals
 

Similar to Distributed system for access control to physical resources based on qualifications (20)

IN-DEPTH ANALYSIS AND SYSTEMATIC LITERATURE REVIEW ON RISK BASED ACCESS CONTR...
IN-DEPTH ANALYSIS AND SYSTEMATIC LITERATURE REVIEW ON RISK BASED ACCESS CONTR...IN-DEPTH ANALYSIS AND SYSTEMATIC LITERATURE REVIEW ON RISK BASED ACCESS CONTR...
IN-DEPTH ANALYSIS AND SYSTEMATIC LITERATURE REVIEW ON RISK BASED ACCESS CONTR...
 
PLANT LEAF DISEASES IDENTIFICATION IN DEEP LEARNING
PLANT LEAF DISEASES IDENTIFICATION IN DEEP LEARNINGPLANT LEAF DISEASES IDENTIFICATION IN DEEP LEARNING
PLANT LEAF DISEASES IDENTIFICATION IN DEEP LEARNING
 
Include at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inInclude at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words in
 
N018138696
N018138696N018138696
N018138696
 
Implementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control PlanImplementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control Plan
 
Is4560
Is4560Is4560
Is4560
 
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA NetworksUtilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA Networks
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 
Cloud Monitoring And Forensic Using Security Metrics
Cloud Monitoring And Forensic Using Security MetricsCloud Monitoring And Forensic Using Security Metrics
Cloud Monitoring And Forensic Using Security Metrics
 
Vulnerabilities detection using attack recognition technique in multi-factor ...
Vulnerabilities detection using attack recognition technique in multi-factor ...Vulnerabilities detection using attack recognition technique in multi-factor ...
Vulnerabilities detection using attack recognition technique in multi-factor ...
 
Audit Controls Paper
Audit Controls PaperAudit Controls Paper
Audit Controls Paper
 
I0516064
I0516064I0516064
I0516064
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management Act
 
Self Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized ActivitySelf Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized Activity
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
 
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 

Distributed system for access control to physical resources based on qualifications

  • 1. Distributed system for access control to physical resources based on qualifications BY :-Darshan Vithani ME-CSE-1st SEM 1 of 12
  • 2. Contents  Introduction  Structure of the distributed system  Further research  Conclusion Access Control to Physical Resources 2 of 12
  • 3. Introduction  In nowadays society, the computer system attacks are real threats, and terms as: hacker, SPAM, phishing, cyber terrorism are heard very often.  Distributed system required to implement a new method for the access control to physical resources, based on qualifications.  The controlled access to resources plays a more and more important role. These ones, along with other methods (e.g. Cryptography, Firewall) Access Control to Physical Resources 3 of 12
  • 4. Introduction  We present a model of access control to physical resources, based on qualifications that can be obtained through a learning process.  Grant to employees of a company the possibility to access the inputs of certain machines (protected objects), according to the qualifications Access Control to Physical Resources 4 of 12
  • 5. Structure of the distributed system  Internet offering to the employees either the access to secured networks (from distance) or the possibility to control, by Internet, certain industrial processes.  We used PLC (Programmable Logic Controller) at controller level By this Controls Equipment by remote location like Home Automation , CCTV Camera , ATM Machine, Reservation & E-learning Access Control to Physical Resources 5 of 12
  • 6. Access Control Model Access Control to Physical Resources 6 of 12
  • 7. Database for Machine Access Control to Physical Resources 7 of 12
  • 8. Web Application to Controls Machine Access Control to Physical Resources 8 of 12
  • 9. Further Research The server level algorithms and the PLC are generalized created, for the “n” machine, but for testing at the hardware level we used only one test machine and one PLC with the modules: RFID interface, Inputs, Outputs, Ethernet  In the same time, further developments shall be realized on the security part, where certain improvements are required, e.g. to secure the Web Service with digital signatures. Access Control to Physical Resources 9 of 12
  • 10. Conclusion In this implementation model of the access control to physical resources, based on qualifications. The advantage of this model is integration of the qualifications in the authorization process helps us in the human resources process Access Control to Physical Resources 10 of 12
  • 11. References [1] Robert Richardson, CSI Director, 2008 - CSI Computer Crime & Security Survey, available online: http://www.cse.msstate.edu [2] Cristea Daniela, Octavian Prostean, Thomas Muschalik and Tirian Ovidiu, An access control pattern based on qualifications to grant access to physic resources, The 3rd European DAAAM International Young Researchers and Scientists Conference 25-28th, Vienna, Austria 2009, ISBN 978-3-901509-70-4, pp. 1765 – 1766 [3] Markus Schumacher, Eduardo Fernandez- Buglioni, Duane Hybertson, Frank Buschmann and Peter Sommerland, Security Patterns Integrating Security and Systems Engineering, John Wiley & Sons, Ltd, 2006, ISBN: 0-470- 85884-2. [4] Fernandez, E.; Ballesteros, J.; Desouza-Doucet, A. & Larrondo-Petrie, D. (2007). Security Patterns for Physical Access Control Systems, in: Data and applications security XXI, Barker, k. & Ahn, G. (Eds), 259-274, Springer, ISBN: 978-3540735335, Germany [5] Martin Raepple, The Developer’s Guide to SAP NetWeaver Security, SAP Press, ISBN 9781- 59229-180-9 [6] Gellert Ulrich and Cristea Daniela, Web Dynpro ABAP for Practitioners, Springer, 2010, ISBN 978-3-642-11386-4 Access Control to Physical Resources 11 of 12