DEVELOPING A SECURITY PROTOCOL FOR A WIRELESS COMPUTER VIRTUAL LABORATORY (WCVLAB)
Journal Title: Indian Journal of Computer Science and Engineering - Year 2011, Vol 2, Issue 6
Abstract
For a Virtual Computer Laboratory (VCLAB) to operate effectively within a Wireless intranet setup, a lot of protocols are employed to function. This write-up is aimed at developing a protocol to secure a Wireless Computer Virtual Laboratory (WCVLAB) of any institution. The protocol developed secures a Wireless Computer Virtual Laboratory through an authentication server by supplying authentication parameters at registration, which will be stored to be used at login for comparison. Fingerprint is used to ensure that a user is who he or she claims to be. Duration for access is allotted for a user, after which initial parameters will be supplied for re-authentication. While a user is still logged-on, security questions will be posed intermittently to avoid spoofing. The methodology used for this research is Structured System Analysis and Design. Java Programming Language is used for coding the program and MySQL is the database tool. The result of the implemented system is a secured protocol that guarantees secured access. This is different from the security of other Computer Virtual Laboratory which uses only users name, pin or registration number.
Authors and Affiliations
EDWARD N. UDO , IMO J. EYO , INI J. UMOEKA
Optimization of Computer Networks
Computer Networks have pervaded our life like anything. They are present in all aspects of our life. Information transmission like Internet usage uses computer networks. As more and more people use computer networks, tra...
MOVING MACHINE TRANSLATION SYSTEM TO WEB
The paper presents an overview of an online system based on Punjabi to Hindi Machine translation system. The implementation of the system is roughly divided into two parts: the client side and the server side. On the cli...
ANONYMIZATION BASED ON NESTED CLUSTERING FOR PRIVACY PRESERVATION IN DATA MINING
Privacy Preservation in data mining protects the data from revealing unauthorized extraction of information. Data Anonymization techniques implement this by modifying the data, so that the original values cannot be acqui...
VERIFICATION OF BEHAVIOR PRESERVATION IN UML SEQUENCE DIAGRAMS USING GRAPH MODELS
The verification of model transformations is gaining significant attention recent years. This paper presents an approach for verifying the behavioral preservance property of UML behavioral models that have been subjected...
A NOVEL APPROACH FOR SELECTION OF BEST SET OF OPTIMIZATION FUNCTIONS FOR A BENCHMARK APPLICATION USING AN EFFECTIVE STRATEGY
Finding right set of optimization techniques for a given application involves lot of complications. The compiler optimization technique for a given platform depends upon the various factors such as hardware settings and...