Gnitc E-Computing Management System

Only available on StudyMode
  • Download(s) : 199
  • Published : April 21, 2013
Open Document
Text Preview
1. INTRODUCTION

This is a web oriented application allows us to access the whole information about the college laboratory. Here we will get the latest information about the system equipments. This generic application designed for assisting the parts of an every system regarding information on the mouse, keyboard, and hard disk, internal and external problems.

2.1 THEME OF PROJECT
This generic application designed for assisting the parts of an every system regarding information on the desktops,laptops,LAN,router, server ,internal and external problems.It provides support to components of head computers to check about his daily reports, can upload issues, and view the system parts. Here administrator will manage the accounts of the systems, view issues, and upload the latest information about the campus

2. LITERATURE SURVEY
2.1 INTRODUCTION

3. SYSTEM REQUIREMENTS SPECIFICATIONS

3.1 PURPOSE

The system is providing facility to the lab admin can make online product details easily. If there is no products (keyboard.mouse, hardware, monitor, harddisk, LAN…etc) or any modifications in that products, the system is providing facility that lab admin can make a request for new products

3.2 SCOPE
* Lab information: Through this service one can access the complete information about the college laboratory such as system repairs, modifications, accounts, etc. * Online assignments: This service provides the facility to technician to upload any issues to submit these assignments online. 3.3 GLOSSARY

* INTEGRITY:The state of being whole, entire,or undiminished: to preserve theintegrity of the empire. * ATTACKER : An adversary involved in an actual attack.
* CONFINDENTIALITY : Preserving authorized restrictions on information access and disclosure,including means for protecting personal privacy and proprietary information. * PRIVACY: Privacy is the ability of an individual to be left alone,out of public view,and in control of inforamtuon about oneself. * SERVERS: Computer that provides a service to other computers, such as processing communications, file storage, or accessing a printing facility. Servers include, but are not limited to web, database, application, authentication, DNS, mail, proxy, and NTP. * PROTOCOLS:Agreed-upon method of communication used within networks. Specification describing rules and procedures that computer products should follow to perform activities on a network. * DATABASES: Structured format for organizing and maintaining easily retrievable information. Simple database examples are tables and spreadsheets. * CRYPTOGRAPHY:Discipline of mathematics and computer science concerned with information security, particularly encryption and authentication. In applications and network security, it is a tool for access control, information confidentiality, and integrity. * SENSOR NETWORK: Wireless Sensor Network, or WSN, is a network of RF transceivers, sensors, machine controllers, microcontrollers, and user interface devices with at least two nodes communicating by means of wireless transmissions.

3.4 OVERALL DESCRIPTION
3.4.1 PROJECT PERSPECTIVE
The problem of statistical disclosure control—revealing accurate statistics about a population while preserving the privacy of individuals—has a venerable history. An extensive literature spans multiple disciplines: statistics, theoretical computer science, security, and databases.  Nevertheless, despite this extensive literature, «privacy breaches» are common, both in the literature and in practice, even when security and data integrity are not compromised.This project revisits private data analysis from the perspective of modern cryptography.  We address many previous difficulties by obtaining a strong, yet realizable, definition of privacy. Intuitively,differential privacy ensures that the system behaves the essentially same way, independent of whether any...
tracking img