Applied Research (IJSBAR)
ISSN 2307-4531 http://gssrr.org/index.php?journal=JournalOfBasicAndApplied e-DoX:DEPED Student Grade Records Management System with Implementation of Advanced Encryption Standard and PKI
Infrastructure
Rommel B. Dya*, Mary Jane A. Laridab, Dr. Bartolome T. Tanguilig c a Technological Institute of the Philippines, 938 Aurora Blvd. Cubao, Quezon City, 1109, Philippines
b
Technological Institute of the Philippines, 938 Aurora Blvd. Cubao, Quezon City, 1109, Philippines
c
Technological Institute of the Philippines, 938 Aurora Blvd. Cubao, Quezon City, 1109, Philippines a Email: dyrommel@gmail.com
b
Email: mjandal98@yahoo.com
c
Email: bttanguilig_3@yahoo.com
Abstract
This study entitled e-DoX: DEPED Student Grade Records Management System with Implementation of Advanced
Encryption Standard and PKI Infrastructure for the Department of Education in the Province of Cavite is an online based application designed to aid private and public schools in submission of reports on promotions composed of
Form 18-A, Form 18-E1 and Form 18-E2 to the Division Office of the Department of Education in the province of
Cavite. The system would also be eliminating factors such as transportation and storage to maximize time allotment for the evaluation of the submitted reports.
In this study Advanced Encryption Standard and Public and Private Infrastructure was implemented in e-DoX to secure digital data into an undecipherable format that are sent by the schools in Cavite to DEPED application. This data is typically scrambled by using hashing algorithms, which convert data into a secret scrambled encryption format. This is the reason AES and PKI was implemented because it has the highest defined level for data encryption and security that will secure important data such as the student grade records of the schools in Cavite.
-----------------------------------------------------------------------* Corresponding
References: [1] B. Gordon. Computing Essentials. United States of America: McGraw-Hill, 2010. [2] P. Baltzan and A. Philips.Essentials of Business Driven Information System. Singapore: McGraw-Hill Education, 2009. [3] R. Ling. Mobile Communication.United Kingdom: Polity Press, 2009. [Aug. 3, 2012]. [5] S. Last and D. Pratt. Exploring Databases. United States of America: John Wiley & Sons, 2006. [6] L. Vogel. “Javascript – Tutorial”. Internet: http://www.vogella.com/articles/JavaScript/article.html, Apr. 27, 2011 [Aug [7] L. Beighley and C. Lindley.JQuery for Dummies.United States of America: John Wiley & Sons, 2010. [8] L. Dykes and C. Ullman. Beginning Ajax (Programmer to Programmer), 1st ed. Wrox, 2007. [9] S. Kietzman. “What is Workflow Management.”Internet: http://www.wisegeek.com/what-is-workflowmanagement.htm, Oct. 17, 2013 [Aug. 3, 2012]. [10] T. Ellis-Christensen. “What is A Hidden Curriculum?.” Internet: http://www.wisegeek.com/what-is-a-hiddencurriculum.htm, Oct. 4, 2013 [Aug. 3, 2012]. International Journal of Sciences: Basic and Applied Research (IJSBAR)(2013) Volume11, No 1, pp 112-158 University – Manila, Philippines, 2008. [15] Dela Merced and Jarabe. “San Miguel Campofrio Automated Filing System.” B.S. thesis, De LaSalle University – Cavite, Philippines, 2000. [17] M. Hijmiragha. Document management System.Seattle, WA U.S.A.: Astus Corporation, 1999. [18] Y. Honda et al. Document management System. Tokyo, Japan:Hitachi, Ltd., 2001. [19] L. Lemay and R. Culburn.Web Publishing with HTML and CSS, 6th ed., Sams Publishing, 2011. [20] I. Sommerville. Software Engineering IE, 9th ed., Adelism-Wesley, 2011. [21] C.F. Niederriter. “Teaching Load Summary.” Internet: http://physics.gac.edu/~chuck/teaching.html, 2007 [Aug. 3, 2012]. [22] M. Allen. “Effective Way to Schedule Faculty Classes.” Internet: http://www.ehow.com/info_7801165_effective-way-schedule-faculty-classes.html, 2012 [Aug Philippines, 2012. thesis, De Lasalle University – Cavite, Philippines, 2000. [26] M. Agarkar et al. (2012). “Document management system with enhanced security.”IOSR Journal of Computer Engineering.[On-line].1(2), pp.79-84.Available:http://www.iosrjournals.org [Sep [27] M. Hasamnis et al. (2012).“Implementation of aes as a custome hardware using nios II processor.”Advanced Computing: An Internation Journal.[On-line].3(4). [28] A. Dennis et al. System Analysis and Design. United States: John Wiley & Sons, 2006. 142 International Journal of Sciences: Basic and Applied Research (IJSBAR)(2013) Volume11, No 1, pp 112-158 International Journal of Sciences: Basic and Applied Research (IJSBAR)(2013) Volume11, No 1, pp 112-158 Appendix B 144 International Journal of Sciences: Basic and Applied Research (IJSBAR)(2013) Volume11, No 1, pp 112-158 International Journal of Sciences: Basic and Applied Research (IJSBAR)(2013) Volume11, No 1, pp 112-158 Appendix C 146 International Journal of Sciences: Basic and Applied Research (IJSBAR)(2013) Volume11, No 1, pp 112-158