Client-Server Data Security and Health Management with Client Monitoring

Authors(6) :-Aniket Yawalkar, Swati Sangle, Mamata Tawar, Rakhi Gedam, Pooja Virulkar, Ashish Pawar

Use of computer system is increasing day by day and is very effective tools for increasing computational power. The aim of this paper is to handle all aspects regarding to the computer system. There issues monitoring, security and health. We are securing the client, monitoring with looking towards health, which may leads better results. In this paper, we discuss about the design and implementing client and server application, which monitor, secure and provide better avoidance related to the health related issues. We provide different security profile on same computer system that restrict the unauthenticated user to access or modify important data. The necessary condition is that Employees should have the separate computer system whereas Manager Activities are also monitored. This system increases accuracy in managing, manager and avoid the unnecessary use of Company computer system.

Authors and Affiliations

Aniket Yawalkar
Department of Information Technology, SSGMCE, Shegaon, Buldhana, Maharashtra, India
Swati Sangle
Department of Information Technology, SSGMCE, Shegaon, Buldhana, Maharashtra, India
Mamata Tawar

Rakhi Gedam

Pooja Virulkar

Ashish Pawar

Monitoring, Client And Server, Unauthorized User, Accuracy.

  1. Jinwei Wang Huazhi Sun and Jianping Fan “DUMS: a Dynamical Updatable Monitoring System for Desktop PCs used for Distributed Computing” .2009 Third IEEE International Symposium on Theoretical Aspects of Software Engineering.
  2. Ann Gledson, Dommy Asfiandy, Joseph Mellor,Thamer Omer Faraj Ba-Dhfari, Gemma Stringer,Samuel Couth, Alistair Burns, Iracema Leroi, Xiaojun Zeng, John Keane, Christopher Bull, Paul Rayson , Alistair Sutcliffe,Peter Sawyer “Combining mouse and keyboard events with highe r level desktop actions to detect mild cognitive impairment”. 2016 IEEE International Conference on Healthcare Informatics.
  3. Marc J. Dupuis, Robert E. Crossler, Barbara Endicott-Popovsky “Measuring the Human Factor in Information Security and Privacy” 2016 49th Hawaii International Conference on System Sciences.
  4. C. L. Anderson and R. Agarwal, “Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions,” MIS Q., vol. 34, no. 3, pp. 613–643, 2010.
  5. Michael Prince, “Does Active Learning Work? A Review of the Research” J. Engr. Education, 93(3), 2232 (2004).
  6. Nelson Cowan “The Magical Mystery Four: How Is Working Memory Capacity Limited, and Why?”.
  7. Mahmood Hussain Kadhem, Ahmed M. Zeki “Prediction of Urinary System Disease Diagnosis: A
  8. Comparative Study of Three Decision Tree Algorithms” 2014 International Conference on Computer Assisted System in Health.

Publication Details

Published in : Volume 2 | Issue 2 | March-April 2017
Date of Publication : 2017-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 31-33
Manuscript Number : CSEIT172219
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Aniket Yawalkar, Swati Sangle, Mamata Tawar, Rakhi Gedam, Pooja Virulkar, Ashish Pawar, "Client-Server Data Security and Health Management with Client Monitoring", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.31-33, March-April-2017.
Journal URL :

Article Preview