Preview

Sample Study

Powerful Essays
Open Document
Open Document
13910 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Sample Study
International Journal of Sciences: Basic and
Applied Research (IJSBAR)

ISSN 2307-4531 http://gssrr.org/index.php?journal=JournalOfBasicAndApplied e-DoX:DEPED Student Grade Records Management System with Implementation of Advanced Encryption Standard and PKI
Infrastructure
Rommel B. Dya*, Mary Jane A. Laridab, Dr. Bartolome T. Tanguilig c a Technological Institute of the Philippines, 938 Aurora Blvd. Cubao, Quezon City, 1109, Philippines

b

Technological Institute of the Philippines, 938 Aurora Blvd. Cubao, Quezon City, 1109, Philippines

c

Technological Institute of the Philippines, 938 Aurora Blvd. Cubao, Quezon City, 1109, Philippines a Email: dyrommel@gmail.com

b

Email: mjandal98@yahoo.com

c

Email: bttanguilig_3@yahoo.com

Abstract
This study entitled e-DoX: DEPED Student Grade Records Management System with Implementation of Advanced
Encryption Standard and PKI Infrastructure for the Department of Education in the Province of Cavite is an online based application designed to aid private and public schools in submission of reports on promotions composed of
Form 18-A, Form 18-E1 and Form 18-E2 to the Division Office of the Department of Education in the province of
Cavite. The system would also be eliminating factors such as transportation and storage to maximize time allotment for the evaluation of the submitted reports.
In this study Advanced Encryption Standard and Public and Private Infrastructure was implemented in e-DoX to secure digital data into an undecipherable format that are sent by the schools in Cavite to DEPED application. This data is typically scrambled by using hashing algorithms, which convert data into a secret scrambled encryption format. This is the reason AES and PKI was implemented because it has the highest defined level for data encryption and security that will secure important data such as the student grade records of the schools in Cavite.
-----------------------------------------------------------------------* Corresponding



References: [1] B. Gordon. Computing Essentials. United States of America: McGraw-Hill, 2010. [2] P. Baltzan and A. Philips.Essentials of Business Driven Information System. Singapore: McGraw-Hill Education, 2009. [3] R. Ling. Mobile Communication.United Kingdom: Polity Press, 2009. [Aug. 3, 2012]. [5] S. Last and D. Pratt. Exploring Databases. United States of America: John Wiley & Sons, 2006. [6] L. Vogel. “Javascript – Tutorial”. Internet: http://www.vogella.com/articles/JavaScript/article.html, Apr. 27, 2011 [Aug [7] L. Beighley and C. Lindley.JQuery for Dummies.United States of America: John Wiley & Sons, 2010. [8] L. Dykes and C. Ullman. Beginning Ajax (Programmer to Programmer), 1st ed. Wrox, 2007. [9] S. Kietzman. “What is Workflow Management.”Internet: http://www.wisegeek.com/what-is-workflowmanagement.htm, Oct. 17, 2013 [Aug. 3, 2012]. [10] T. Ellis-Christensen. “What is A Hidden Curriculum?.” Internet: http://www.wisegeek.com/what-is-a-hiddencurriculum.htm, Oct. 4, 2013 [Aug. 3, 2012]. International Journal of Sciences: Basic and Applied Research (IJSBAR)(2013) Volume11, No 1, pp 112-158 University – Manila, Philippines, 2008. [15] Dela Merced and Jarabe. “San Miguel Campofrio Automated Filing System.” B.S. thesis, De LaSalle University – Cavite, Philippines, 2000. [17] M. Hijmiragha. Document management System.Seattle, WA U.S.A.: Astus Corporation, 1999. [18] Y. Honda et al. Document management System. Tokyo, Japan:Hitachi, Ltd., 2001. [19] L. Lemay and R. Culburn.Web Publishing with HTML and CSS, 6th ed., Sams Publishing, 2011. [20] I. Sommerville. Software Engineering IE, 9th ed., Adelism-Wesley, 2011. [21] C.F. Niederriter. “Teaching Load Summary.” Internet: http://physics.gac.edu/~chuck/teaching.html, 2007 [Aug. 3, 2012]. [22] M. Allen. “Effective Way to Schedule Faculty Classes.” Internet: http://www.ehow.com/info_7801165_effective-way-schedule-faculty-classes.html, 2012 [Aug Philippines, 2012. thesis, De Lasalle University – Cavite, Philippines, 2000. [26] M. Agarkar et al. (2012). “Document management system with enhanced security.”IOSR Journal of Computer Engineering.[On-line].1(2), pp.79-84.Available:http://www.iosrjournals.org [Sep [27] M. Hasamnis et al. (2012).“Implementation of aes as a custome hardware using nios II processor.”Advanced Computing: An Internation Journal.[On-line].3(4). [28] A. Dennis et al. System Analysis and Design. United States: John Wiley & Sons, 2006. 142 International Journal of Sciences: Basic and Applied Research (IJSBAR)(2013) Volume11, No 1, pp 112-158 International Journal of Sciences: Basic and Applied Research (IJSBAR)(2013) Volume11, No 1, pp 112-158 Appendix B 144 International Journal of Sciences: Basic and Applied Research (IJSBAR)(2013) Volume11, No 1, pp 112-158 International Journal of Sciences: Basic and Applied Research (IJSBAR)(2013) Volume11, No 1, pp 112-158 Appendix C 146 International Journal of Sciences: Basic and Applied Research (IJSBAR)(2013) Volume11, No 1, pp 112-158

You May Also Find These Documents Helpful

  • Powerful Essays

    Continuing of Richman Investments has expanded with more offices, locations and clients, which the needs of protection for assets are greater. I have decided to implement the following policy for removable media: Richman Investments staff may only use Richman Investments’ removable media in their work computers. Richman Investments removable media may not be connected to or used in computers that are not owned or leased by the Richman Investments without explicit permission of the Richman Investments IT manager. Sensitive information should be stored on removable media only when required in the performance of your assigned duties or when providing information required by other state or federal agencies. When sensitive information is stored on removable media, it must be encrypted in accordance with the Richman Investments’ Acceptable Encryption Policy. Security assurance and user-friendly sites are required if Richman Investments is to be successful at attracting customers to their Internet sites. It is therefore important to be able to understand the business requirements and be able to translate these into a public network presence with security in mind. The Digital revolution of the 21st Century has not been achieved without its consequences. Real time business requirements and economic drivers have forced rapid changes to the methods used to conduct business-to-business and business to client communication. The Internet has now become a convenient and economic deployment medium for global business. For Richman Investments Computer User’s Policy, although employees are given PCs so they can deliver the task that they are assigned, it must be understood that these PCs are property of Richman Investments and must not be abused for personal use. Computer resources are expensive and so offensive material must not be…

    • 1444 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    NETWORKING ADMIN

    • 606 Words
    • 3 Pages

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cis 850 Study Guid

    • 499 Words
    • 2 Pages

    * Why do organizations often have several databases? What are the different types of databases? How do they differ?…

    • 499 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab #3

    • 517 Words
    • 3 Pages

    This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and private key and a secret key for encryption only.…

    • 517 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The data must be kept secure against unlawful or unauthorised processing, accidental loss or erasure.…

    • 1120 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    In order to operate a successful and efficient E-Business, organizations must avoid legal problems by always operating by policies and procedures established by the company and the intellectual property laws and rights. Security is crucial on an online business to protect customer’s personal and financial information. In order to perform safely and responsibly, organization must keep operating systems updated, limit access of sensitive information to those who need to see it, and use encryption software to protect customers’ financial information from theft during…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    They are numerous protocols and standards that are used for communications over networks. But only a few protocols are cryptographic in nature. Cryptographic protocols provide secure communication between two communicating entities over the insecure network. Cryptographic protocols use either symmetric or asymmetric or a combination of both the algorithm to secure the communication channel. Presented in this paper are various cryptographic protocols that provide encryption to data in transit.…

    • 2890 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    PKI is the most common public key encryption systems and, in most cases, this relies on manual trust and key distribution.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Another security concern is that an employee would try to read any student information on Credential Solutions database. Therefore, to address this concern all information is encrypted, even details such as student’s name. The reason why Credential Solution encrypts every piece of information is because they assume the unencrypted information may be useful to deduce the encrypted…

    • 1267 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    By holding data of the students and the staff at Portland College, this act is very important to keeping the individuals’ information safe and secure. At Portland College there are many ways in which the college have their student’s details, such as written on paper, stored on databases on the computer and also in records, by backing up computers and having passwords which only a few people in the college can access they are keeping the data they hold safe. Keeping paper records in safe places which are locked at all times, unless they are needed in emergencies such as hospital trips and for anything other important times, Portland College take legislation, policies and procedures very serious and do all they can to make sure the information they hold is kept safe and secure from anybody that it does not concern.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Spectroscopy Report

    • 8131 Words
    • 43 Pages

    There are three different major types of spectroscopy techniques covered in our practical, which includes Ultraviolet-Visible Light Spectroscopy, Infrared Spectroscopy and Atomic Absorption Spectroscopy & Atomic Emission Spectroscopy. The use of spectrophotometry in the analysis of chemicals quantitatively and qualitatively is common, since they’re readily available and generally easy to operate, at the same time giving fairly accurate and consistent results. The choice of instrument depends on the wavelength region of choice, which in turn depends on the nature of analyte, either they are coloured or can be changed into coloured derivatives; whether they contains functional group that absorbs light in the UV or Infrared region; or even other absorbing species that depends on the analyte present in the same phase.…

    • 8131 Words
    • 43 Pages
    Powerful Essays
  • Good Essays

    Public Key Infrastructure

    • 2215 Words
    • 9 Pages

    RFC 2822 (Internet Security Glossary) defines public-key infrastructure (PKI) as the set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke digital certificates based on asymmetric cryptography. The principal objective for developing a PKI is to enable secure, convenient, and efficient acquisition of public keys. The Internet Engineering Task Force (IETF) Public Key Infrastructure X.509 (PKIX) working group has been the driving force behind setting up a formal (and generic) model based on X.509 that is suitable for deploying a certificate-based architecture on the Internet. This section describes the PKIX model.…

    • 2215 Words
    • 9 Pages
    Good Essays
  • Better Essays

    Today’s technologies allow users to prove their authenticity and with data encryptions allow data to be transmitted safely over the medium. Data encryption should be at a satisfactory level of security to protect against intruders, thus data integrity have been compromised. User authentication must also be present with the encryption and data transmission process to ensure that the data sent are received by authorized receiver. Other than data encryption, a good firewall should also be implemented on the database server to avoid external intruders from accessing unauthorized…

    • 1704 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Cryptography and encryption have been utilized for secure communication for many years. All through history, military communication has had the best impact on encryption and the progressions thereof. The case study describes an encryption method that has been used historically but no longer used. It shows that although the World Wide Web is an electronic convention which enables individuals to convey mail, information, and business through a digital medium but this technique for information trade has caused an enormous requirement for information security. The historical secret way to communicate between two countries during WWII is discussed in the paper. The study emphasizes on the how communication took place and its components.…

    • 722 Words
    • 3 Pages
    Good Essays