Client-Server Data Security and Health Management with Client Monitoring

Authors

  • Aniket Yawalkar  Department of Information Technology, SSGMCE, Shegaon, Buldhana, Maharashtra, India
  • Swati Sangle  Department of Information Technology, SSGMCE, Shegaon, Buldhana, Maharashtra, India
  • Mamata Tawar  
  • Rakhi Gedam  
  • Pooja Virulkar  
  • Ashish Pawar  

Keywords:

Monitoring, Client And Server, Unauthorized User, Accuracy.

Abstract

Use of computer system is increasing day by day and is very effective tools for increasing computational power. The aim of this paper is to handle all aspects regarding to the computer system. There issues monitoring, security and health. We are securing the client, monitoring with looking towards health, which may leads better results. In this paper, we discuss about the design and implementing client and server application, which monitor, secure and provide better avoidance related to the health related issues. We provide different security profile on same computer system that restrict the unauthenticated user to access or modify important data. The necessary condition is that Employees should have the separate computer system whereas Manager Activities are also monitored. This system increases accuracy in managing, manager and avoid the unnecessary use of Company computer system.

References

  1. Jinwei Wang Huazhi Sun and Jianping Fan “DUMS: a Dynamical Updatable Monitoring System for Desktop PCs used for Distributed Computing” .2009 Third IEEE International Symposium on Theoretical Aspects of Software Engineering.
  2. Ann Gledson, Dommy Asfiandy, Joseph Mellor,Thamer Omer Faraj Ba-Dhfari, Gemma Stringer,Samuel Couth, Alistair Burns, Iracema Leroi, Xiaojun Zeng, John Keane, Christopher Bull, Paul Rayson , Alistair Sutcliffe,Peter Sawyer “Combining mouse and keyboard events with highe r level desktop actions to detect mild cognitive impairment”. 2016 IEEE International Conference on Healthcare Informatics.
  3. Marc J. Dupuis, Robert E. Crossler, Barbara Endicott-Popovsky “Measuring the Human Factor in Information Security and Privacy” 2016 49th Hawaii International Conference on System Sciences.
  4. C. L. Anderson and R. Agarwal, “Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions,” MIS Q., vol. 34, no. 3, pp. 613–643, 2010.
  5. Michael Prince, “Does Active Learning Work? A Review of the Research” J. Engr. Education, 93(3), 2232 (2004).
  6. Nelson Cowan “The Magical Mystery Four: How Is Working Memory Capacity Limited, and Why?”.
  7. Mahmood Hussain Kadhem, Ahmed M. Zeki “Prediction of Urinary System Disease Diagnosis: A
  8. Comparative Study of Three Decision Tree Algorithms” 2014 International Conference on Computer Assisted System in Health.

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
Aniket Yawalkar, Swati Sangle, Mamata Tawar, Rakhi Gedam, Pooja Virulkar, Ashish Pawar, " Client-Server Data Security and Health Management with Client Monitoring, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.31-33, March-April-2017.