I-Buttons Based Advanced Access System
Abstract
vast and therefore the Human working efficiency rising day to day.
There are few disadvantages like utilization of these technologies.
For example some unauthorized or illegal person can get access of
your system and they have to experience a lot.
Therefore to overcome this mentioned complexity we can build a
control system to avoid this illegal access. It called “Access
Control”, which is a scheme which enables an ability to control
access to areas and resources in a given physical facility or computer
based information system. An access control system, within the field
of physical security, is usually seen as the second layer in the
security or safety of a physical structure. And the advantage of it is
that this system contains very high end verification and
authentication technology which is unable to brake by such
unauthorized element. For this reason we will use the one of the
most recent, next generation and very advanced technology which is
“I-Button”.
Full Text:
PDFReferences
Stallings, William, Ph.D., Data and Computer Communications.2nd ed.,
New York: Macmillan Publishing. 107-112.
Buller, Jon, “High Speed Software CRC Generation”, EDN, Volume 36,
, pg. 210.
S. Bleha, C. Slivinsky, and B. Hussien, Computer access security systems
using keystroke dynamics, IEEE Transactions on Pattern Analysis and
Machine Intelligence12 (1990), no. 12, 1217–1222. 127.
S. A. Bleha and M. S. Obaidat, Computer user verification using the
perceptron algorithm, IEEE Transactions on Systems, Man and
Cybernetics23 (1993), no. 3, 900–902. 127.
M. Brown and S. J. Rogers, User identification via keystroke
characteristics of typed names using neural networks, International Journal
of Man-Machine Studies 39 (1993), 999 – 1014. 127.
W. L. Bryan and N. Harter, Studies in the physiology and psychology of
the telegraphic language, Psychological Review4 (1897), 27–53. 125.
J. Crenshaw, Integer square roots, Embedded Systems Programming
(1998), no. 2.130, 131.
J. D. Garcia, Personal identification apparatus, US Patent 4 621 334,
November 1986. 127 .
Chirutkar harshadkumar Govindrao and Dr. H.N. Pandya “secure digital
access system using I-button”in 2010.
STMicroelectronics, L5973D up to 2 a step down switching regulator
http://www.st.com/ web/catalog/sense power/FM142/CL1854/SC1 575/
PF63225 .
Muhammad Saad Rahman, Buck Converter Design Issues - Master thesis
performed in division of Electronic Devices, Thesis No: LiTH-ISY-EX--
/3854--SE 2007.
Cercel Constantin, Grofu Florin, Nebunu Dana “Modern system for access
security” Annals of the „Constantin Brancusi” University of Tirgu Jiu,
Engineering Series, No.3/2011, pag. 66-75, ISSN 1842 – 4856.
R. Kuhn, Coyne, E. J., and Weil, T. R., "Adding Attributes to Role Based
Access Control," IEEE Computer Society, 2010.
K. Beznosov, "Requirements for access control: US Healthcare domain,"
S. Chong, K. Vikram, and A. C. Myers. Sif: Enforcing confidentiality and
integrity in web applications. Proceedings of the 16th Annual USENIX
Security Symposium, 2007.
Kenneth J. Ayala, "The 8051 Microcontroller Architecture, Programming
& Applications”.
Refbacks
- There are currently no refbacks.
Copyright © IJETT, International Journal on Emerging Trends in Technology