Architecture Of The Security System

1206 Words Mar 24th, 2016 5 Pages
Chapter Three

Architecture of the security System

3.1 Introduction
This chapter is dedicated to present the design considerations and the main implementation steps to establish Zero-Knowledge protocol model, the established proto-type is a web-based application, represented as a web-site. The major requirements (CIA) confidentiality, integrity, and authenticity are covered by the security system.
3.2 Architecture of the security system
In order to get a system is characterized by durability, flexibility and resistant any potential change, the security system is designed and consists of three layers: the user interface layer, the application logic layer and the database layer. All these layers in the security system the main goal is to make applications evolve and implementation easy and efficient.
The first layer(interface layer) offers to the user a friendly and convenient entry to contact with the system.The second layer (application logic layer) implements the controlling functionalities and manipulating the underlying logic connection of information flows; finally the data modeling job is conducted by the database layer, which can store, index, manage and model information needed for this application [41]. 3.2.1 Client Layer: The users (applicants) can access the data on the server through any web-browser (like Google Chrome or Netscape). To build this system a number of sub-programs were built using some programming languages. The main program was…
Open Document