Open Access Open Access  Restricted Access Subscription Access

e-DoX:DEPED Student Grade Records Management System with Implementation of Advanced Encryption Standard and PKI Infrastructure

Rommel Bacalando Dy, Mary Jane A. Larida, Bartolome T. Tanguilig

Abstract


This study entitled e-DoX: DEPED Student Grade Records Management System with Implementation of Advanced Encryption Standard and PKI Infrastructure for the Department of Education in the Province of Cavite is an online based application designed to aid private and public schools in submission of reports on promotions composed of Form 18-A, Form 18-E1 and Form 18-E2 to the Division Office of the Department of Education in the province of Cavite. The system would also be eliminating factors such as transportation and storage to maximize time allotment for the evaluation of the submitted reports.

In this study Advanced Encryption Standard and Public and Private Infrastructure was implemented in e-DoX to secure digital data into an undecipherable format that are sent by the schools in Cavite to DEPED application. This data is typically scrambled by using hashing algorithms, which convert data into a secret scrambled encryption format. This is the reason AES and PKI was implemented because it has the highest defined level for data encryption and security that will secure important data such as the student grade records of the schools in Cavite.

The study covers all of the underlying plans and designs that were considered and executed in order to accomplish the research project. This includes collective plans and blueprints right from the conceptualization of the research project, data gathering on the existing system, knowledge requirements on different technologies included in the system, design and development of the system, up to the software evaluation.

The researcher used Prototyping as the method for development. This type of approach of developing the software is used for people who are usually not good at specifying their requirements, nor can tell properly about what they expect from the software. This type of System Development Method is employed when it is very difficult to obtain exact requirements from the client. While making the model, user keeps giving feedbacks from time to time and based on it, a prototype is made.

The findings of this project based on all of the results gathered during the software evaluation phase were carefully tabulated and analyzed by the proponent to come up with the best possible conclusion and recommendations for the betterment of the research project. The research project during the evaluation phase received an overall strongly acceptable remark from the respondents.


Keywords


Advanced Encryption Standard; Department of Education; Document Management; PKI; Records Management; Security, Student Grade

Full Text:

PDF

References


B. Gordon. Computing Essentials. United States of America: McGraw-Hill, 2010.

P. Baltzan and A. Philips.Essentials of Business Driven Information System. Singapore: McGraw-Hill Education, 2009.

R. Ling. Mobile Communication.United Kingdom: Polity Press, 2009.

C. Heilmann. PHP: What You Need To Know To Play With TheWeb. Internet: http://coding.smashingmagazine.com/2010/04/15/php-what-you-need-to-know-to-play-with-the-web/, Apr. 15, 2010 [Aug. 3, 2012].

S. Last and D. Pratt. Exploring Databases. United States of America: John Wiley & Sons, 2006.

L. Vogel. Javascript Tutorial. Internet: http://www.vogella.com/articles/JavaScript/article.html, Apr. 27, 2011 [Aug. 3, 2012].

L. Beighley and C. Lindley.JQuery for Dummies.United States of America: John Wiley & Sons, 2010.

L. Dykes and C. Ullman. Beginning Ajax (Programmer to Programmer), 1st ed. Wrox, 2007.

S. Kietzman. What is Workflow Management.Internet: http://www.wisegeek.com/what-is-workflow-management.htm, Oct. 17, 2013 [Aug. 3, 2012].

T. Ellis-Christensen. What is A Hidden Curriculum?. Internet: http://www.wisegeek.com/what-is-a-hidden-curriculum.htm, Oct. 4, 2013 [Aug. 3, 2012].

R. Maliza and E. Cruz and M. Singh.Online Integrated High School Information System for Holy Child Catholic.B.S. thesis, Lyceum of the Philippines University Manila, Philippines, 2008.

J. De Leon. Eulogio Amang Rodriguez Institute of Science and Technology Online Registration System.B.S. thesis, Lyceum of the Philippines University Manila, Philippines, 2008.

Cruz et al. Patient Management System for Christ the King Hospital. B.S. thesis, Lyceum of the Philippines University Manila, Philippines, 2008.

Purificacion and Manikan. File Management and Monitoring System of KasambuhayEstigmatine Foundation Inc.B.S. thesis, De LaSalle University Cavite, Philippines, 2004.

Dela Merced and Jarabe. San Miguel Campofrio Automated Filing System. B.S. thesis, De LaSalle University Cavite, Philippines, 2000.

Chen et al. Computer-based document management System. Los Gatos, California: Caere Corporation,1997.

M. Hijmiragha. Document management System.Seattle, WA U.S.A.: Astus Corporation, 1999.

Y. Honda et al. Document management System. Tokyo, Japan:Hitachi, Ltd., 2001.

L. Lemay and R. Culburn.Web Publishing with HTML and CSS, 6th ed., Sams Publishing, 2011.

I. Sommerville. Software Engineering IE, 9th ed., Adelism-Wesley, 2011.

C.F. Niederriter. Teaching Load Summary. Internet: http://physics.gac.edu/~chuck/teaching.html, 2007 [Aug. 3, 2012].

M. Allen. Effective Way to Schedule Faculty Classes. Internet: http://www.ehow.com/info_7801165_effective-way-schedule-faculty-classes.html, 2012 [Aug. 3, 2012].

P.J. De Guzman and D. Encarnacion and M. Evangelio.Course Scheduling with Faculty Loading System for College of Sciences of De Lasalle University Dasmarias.B.S. thesis, De Lasalle University Cavite, Philippines, 2012.

Diaz and Japitana. DLSU-D Computer Studies Department Automated Office Management System. B.S. thesis, De Lasalle University Cavite, Philippines, 2000.

M. Crypto. Advanced Encryption Standard. Internet:http://en.wikipedia.org/wiki/Advanced_Encryption_StandardMar. 19, 2004 [Aug. 24, 2013].

M. Agarkar et al. (2012). Document management system with enhanced security.IOSR Journal of Computer Engineering.[On-line].1(2), pp.79-84.Available:http://www.iosrjournals.org [Sep. 24, 2012].

M. Hasamnis et al. (2012).Implementation of aes as a custome hardware using nios II processor.Advanced Computing: An Internation Journal.[On-line].3(4).

A. Dennis et al. System Analysis and Design. United States: John Wiley & Sons, 2006.


Refbacks

  • There are currently no refbacks.


 

 
  
 

 

  


About IJSBAR | Privacy PolicyTerms & Conditions | Contact Us | DisclaimerFAQs 

IJSBAR is published by (GSSRR).