Isredza Rahmi A Hamid
Universiti Tun Hussein Onn Malaysia, Johor, Malaysia

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

E-Store Management Using Bell-LaPadula Access Control Security Model Saida Nafisah Roslan; Isredza Rahmi A Hamid; Palaniappan Shamala
JOIV : International Journal on Informatics Visualization Vol 2, No 3-2 (2018): The Diversity in Information Systems
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (850.339 KB) | DOI: 10.30630/joiv.2.3-2.140

Abstract

Generally, the existing store management system does not provide any access control mechanism in order to manage resources. All levels of user have the same right to access the store and borrow the equipment. Therefore, the E-Store management system using Bell-LaPadula access control model was proposed. The prototyping methodology was used to develop the system because methodology model is quickly constructed to test or illustrate design features and ideas, in order to gather user feedback. Moreover, the system is built using hypertext processor (PHP) language. The E-Store system has three types of users, which are known as top management of Welding Department, lecturers and students. The user’s access control is divided by high-level privilege to lower-level privilege. Therefore, each user will have different login interface according to their role and access right to the system. Through the system, high-level user manages in and out equipment flow, manages authorization, view history log in activity and verify complaint report. Lower-level user can view list of equipment, report complaint and damage equipment and borrow equipment. The E-Store management system is expected to manage the store effectively and reduced redundancy issues of equipment requested. The user access right has been assigned based on their access level.
Multilevel Authentication for Social Network Dalian Wu Zhia Sheng; Isredza Rahmi A Hamid; Hannani Aman
JOIV : International Journal on Informatics Visualization Vol 2, No 3-2 (2018): The Diversity in Information Systems
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (877.613 KB) | DOI: 10.30630/joiv.2.3-2.146

Abstract

Nowadays, social network plays a vital role in communication. Normally user used social networks in daily activities. However, this left all online users susceptible to misuse and abuse. Recently, there has been a remarkable growth in number of hacking as well. Once the computer is online, anyone can have access to the network. Therefore, we proposed a secure social network site called SocialBook where users can post status, photos and connect with friends. This system is developed using PHP programming language and Iterative and Incremental Development methodology.  The purpose of developing this system is to solve unsecured login accounts and lack of user authentication problem. This system applies the secret question procedure when the user wants to change their account password. Moreover, SocialBook use idle session timeout mechanism for additional security. When the user is idle for ten minutes, they will be logged out automatically. So, the user will be less worry about their account from being hacked and the identity impersonation by unauthorized user.