Integrated access control security system model (IACSS-M)

dc.creatorMayieka, Jared Maranga
dc.creatorAteya, Ismail Lukandu
dc.date05/20/2013
dc.dateMon, 20 May 2013
dc.dateMon, 20 May 2013 14:48:54
dc.dateMon, 20 May 2013 14:48:54
dc.date.accessioned2015-03-18T11:28:57Z
dc.date.available2015-03-18T11:28:57Z
dc.descriptionThesis submitted in partial fulfillment for award of the degree of Master of Information Technology at Stathmore University.Complete thesis
dc.descriptionDefining an Access Control security system service for any organization’s application requires the choice of the access control security model and process for the formulation of access decision rules to be used by the access enforcement mechanism that can be implemented in such organizations.The lack of an integrated access control security system model to provide framework for the development of an access control system for universities has presented enormous challenges to the universities in Kenya. The universities need to monitor, authenticate and verify people entering into and utilizing their resources. Additionally, there is a challenge of integrating different systems and departments thereby leaving a gap in the administration process.There is therefore need to provide a model that would help in providing the benchmark for developing access control systems to integrate different systems and departments in the institutions. Such benchmarks can be guided by technology such as smart cards,rules and policy definition among others. This research aims at designing a policy driven access control model (PD-ACM) that can be used in both developing the access control model and formulating the access decision rules adopted by institutions of higher learning in Kenya to develop their access control systems more specifically for their physical access control.In summary, this thesis aims at developing an integrated access control security system model for universities in Kenya and this process will be guided be Activity, System and Set theories. It is important for institutions to adopt a specific model to guide their access control security system development process so as to be able to effectively,efficiently and reliably monitor, authenticate and authorize all those accessing their facilities and resources.
dc.description.abstractDefining an Access Control security system service for any organization’s application requires the choice of the access control security model and process for the formulation of access decision rules to be used by the access enforcement mechanism that can be implemented in such organizations. The lack of an integrated access control security system model to provide framework for the development of an access control system for universities has presented enormous challenges to the universities in Kenya. The universities need to monitor, authenticate and verify people entering into and utilizing their resources. Additionally, there is a challenge of integrating different systems and departments thereby leaving a gap in the administration process. There is therefore need to provide a model that would help in providing the benchmark for developing access control systems to integrate different systems and departments in the institutions. Such benchmarks can be guided by technology such as smart cards, rules and policy definition among others. This research aims at designing a policy driven access control model (PD-ACM) that can be used in both developing the access control model and formulating the access decision rules adopted by institutions of higher learning in Kenya to develop their access control systems more specifically for their physical access control. In summary, this thesis aims at developing an integrated access control security system model for universities in Kenya and this process will be guided be Activity, System and Set theories. It is important for institutions to adopt a specific model to guide their access control security system development process so as to be able to effectively, efficiently and reliably monitor, authenticate and authorize all those accessing their facilities and resources.
dc.formatNumber of Pages: xii, 86 p.
dc.identifier.urihttp://hdl.handle.net/11071/3553
dc.languageeng
dc.rightsBy agreeing with and accepting this license, I (the author(s), copyright owner or nominated agent) agree to the conditions, as stated below, for deposit of the item (referred to as .the Work.) in the digital repository maintained by Strathmore University, or any other repository authorized for use by Strathmore University. Non-exclusive Rights Rights granted to the digital repository through this agreement are entirely non-exclusive. I understand that depositing the Work in the repository does not affect my rights to publish the Work elsewhere, either in present or future versions. I agree that Strathmore University may electronically store, copy or translate the Work to any approved medium or format for the purpose of future preservation and accessibility. Strathmore University is not under any obligation to reproduce or display the Work in the same formats or resolutions in which it was originally deposited. SU Digital Repository I understand that work deposited in the digital repository will be accessible to a wide variety of people and institutions, including automated agents and search engines via the World Wide Web. I understand that once the Work is deposited, metadata may be incorporated into public access catalogues. I agree as follows: 1.That I am the author or have the authority of the author/s to make this agreement and do hereby give Strathmore University the right to make the Work available in the way described above. 2.That I have exercised reasonable care to ensure that the Work is original, and to the best of my knowledge, does not breach any laws including those relating to defamation, libel and copyright. 3.That I have, in instances where the intellectual property of other authors or copyright holders is included in the Work, gained explicit permission for the inclusion of that material in the Work, and in the electronic form of the Work as accessed through the open access digital repository, or that I have identified that material for which adequate permission has not been obtained and which will be inaccessible via the digital repository. 4.That Strathmore University does not hold any obligation to take legal action on behalf of the Depositor, or other rights holders, in the event of a breach of intellectual property rights, or any other right, in the material deposited. 5.That if, as a result of my having knowingly or recklessly given a false statement at points 1, 2 or 3 above, the University suffers loss, I will make good that loss and indemnify Strathmore University for all action, suits, proceedings, claims, demands and costs occasioned by the University in consequence of my false statement.
dc.subjectSmart cards
dc.subjectComputers--Access controls
dc.titleIntegrated access control security system model (IACSS-M)
dc.typeThesis
Files