Blockchain Based User Management System

Author(s):  
Mustafa Temiz ◽  
Ahmet Soran ◽  
Halil Arslan ◽  
Hilal Erel
2015 ◽  
Vol 24 (1) ◽  
pp. 161-188
Author(s):  
Melike Yigit ◽  
Muhammed Macit ◽  
V. Cagri Gungor ◽  
Taskin Kocak ◽  
Oguz Ozhan

2012 ◽  
Vol 21 (5) ◽  
pp. 280-284
Author(s):  
Georgios Mamalakis ◽  
Chariton Karamitas

2017 ◽  
Vol 65 (4) ◽  
pp. 755-769 ◽  
Author(s):  
Eduardo Luengo ◽  
Shahram Shah Heydari ◽  
Khalil El-Khatib

2018 ◽  
Vol 1 (1) ◽  
pp. 48-54
Author(s):  
I Putu Agus Eka Darma Udayana

Elearning and web based information systems is a means to communicate and exchange information for academic purposes.  Nowadays lightweight directory access protocol (LDAP) is a state of the art method of choice. With LDAP technologies user only need one username and password to access to multiple web based application, The problem is if the user wanted to do autentification said user had to input their credentials over and over again for each application. To solve that problem single sign on mechanism (SSO) is invented. With SSO user only need login once and they got all the same credentials with them to all intergrated application wthin the campus. To implement the SSO we use Central authentication service (CAS) as a authentifiation central within LDAP structure as a user management. In this reseach we see that single sign on (SSO) system that intergrated into student management system, E-Learning system and  Internal blog system both use of database based system or even LDAP based system.


2020 ◽  
Vol 4 (2) ◽  
pp. 63
Author(s):  
Sivana Salahadin Muhamad ◽  
Aso Mohammad Darwesh

With the innovation of new technologies, many life concepts have been changed. However, libraries remain the same in many sides while the main role of libraries has been changed and new references may not need a classical library as it was 50 years ago. In the same time, library services can be improved using Internet of Things (IoT) to increase user satisfactions. In recent years, there has been arisen in the diversity of implementation based on radio-frequency identification (RFID) systems and has been successfully utilized in several areas such as health care and transportation. RFID-based library management system will let rapid transaction flow for the library and could prove instant and long-term benefits to library in traceability and security. To solve the problem that it is inconvenient to find references in the traditional library, a kind of reference positioning system using RFID technology is designed to achieve fast search references in the library. Searching and sorting misplaced references are a hard task often carried out by the librarians. In this paper, the performance of RFID reader motion and tags allows fast transaction flow and easily handling the process like references borrowing from library can be done using RFID technology and users will get notified using Global System for Mobile. Two big issues have been exposed and tried to find the best solution for them, first is the management process of any library, from user management to shelving system and the second one is the data and reference security. The results show that the system can quickly find the references that bookworms hid, and the references are not timely put back on the shelves. Furthermore, the new library hall design and IoT-based system improve the security.


2021 ◽  
Vol 7 (1) ◽  
pp. 30-39
Author(s):  
Fadlan Abdillah Hasibuan ◽  
Subhiyanto

Abstract— This research aims to create a proxy hotspot network to connect to the internet with a login system for users,namely teachers, staff and students at Madrasah Aliyah Al-Azhaar Ummu Suwanah and create a user management system on the hotspot so that network administrators can control and monitor users. and network security can be covered. Building a mikrotik hotspot network at Madrasah Aliyah Al-Azhaar Ummu Suwanah with the PIECES modeling analysis method using Winbox, while for network development with Usermanager. The test results conducted by the user have been connected to the proxy hotspot and got the bandwidth according to the package received. The design of the proxy hotspot network at Madrasah Aliyah Al-Azhaar Ummu Suwanah shows that the proxy hotspot provides convenience and practicality in using the internet. Intisari— Penilitian ini bertujuan untuk membuat sebuah jaringan hotspot mikrotik agar terhubung ke internet dengansistem login untuk para pengguna yaitu, guru, staff maupun siswa di Madrasah Aliyah Al-Azhaar Ummu Suwanah danmembuat sebuah sistem manajemen user pada hotspot sehingga administrator jaringan dapat mengontrol dan memonitoringuser serta keamanan jaringan bisa tertutupi. Membangun jaringan hotspot mikrotik di Madrasah Aliyah Al-Azhaar UmmuSuwanah dengan metode analisis pemodelan PIECES menggunakan winbox, sedangkan untuk pengembanganjaringan dengan usermanager. Hasil uji coba yang dilakukan pengguna sudah terhubung ke hotspot mikrotik dan mendapatbandwidth sesuai dengan paket yang didapat. Rancang bangun jaringan hotspot mikrotik di Madrasah Aliyah Al-Azhaar UmmuSuwanah ini menunjukkan bahwa hotspot mikrotik memberikan kemudahan dan kepraktisan dalam penggunaan internet.


2021 ◽  
Vol 23 (06) ◽  
pp. 231-237
Author(s):  
Hardik Devrangadi ◽  
◽  
Rithwik Goel ◽  
Vishnusai Reddy Tadiparthi ◽  
Mohammed Kalender Shihab ◽  
...  

For any insurance contract to see the light of day, a particular process flow is usually followed. This process flow begins with the customer calling an agent to obtain insurance, and ends with the customer receiving a quote for the coverage. Precision methods focus on improving precision and quality and on planning measures that absolutely address issues and meet the necessary requirements. Unlike automation where the focus is on speeding up tasks and processes, a precision-based approach is centered around improving the quality of the process. More current practices call for ceaselessly examining and retooling tasks/operations to achieve ever more noteworthy business esteem. In this paper, the Insurance Policy Administration System is covered in detail. The format, layout, and key details that the insurance policy entails are thoroughly covered. Some key functionalities like The Policy Submission, Risk Analysis, Policy changes and renewals, Policy cancellation in a typical Policy Administration System are reviewed. Since the Policy Administration System cannot be a standalone service and has to be used along with external systems, the integration of this typical policy administration system with an external system like a user management system is also discussed.


2014 ◽  
Author(s):  
Jaegeol Yim ◽  
◽  
Gyeyoung Lee ◽  
Kyungsoo Ham ◽  
◽  
...  

Sign in / Sign up

Export Citation Format

Share Document