Contemplation of Effective Security Measures in Access Management from Adoptability Perspective
With the extension in computer networks, there has been a drastic change in the disposition of network security. Security has always been a major concern of any organization as it involves mechanisms to ensure reliable access. In the present era of global electronic connectivity where hackers, eaves...
Gespeichert in:
Veröffentlicht in: | International journal of advanced computer science & applications 2015-01, Vol.6 (8) |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 8 |
container_start_page | |
container_title | International journal of advanced computer science & applications |
container_volume | 6 |
creator | Mehraj, Tehseen Rasool, Bisma Ul, Burhan Baba, Asifa A., Prof |
description | With the extension in computer networks, there has been a drastic change in the disposition of network security. Security has always been a major concern of any organization as it involves mechanisms to ensure reliable access. In the present era of global electronic connectivity where hackers, eavesdroppers, electronic frauds, viruses are growing in number, security has proved to be indispensable. Although numerous solutions have been put forth in literature to guarantee security, they have botched with related traits like efficiency and scalability. Despite the range of security solutions that have been presented by experts, not a single approach has been wholly agreed upon to provide absolute security or standardized upon unanimously. Furthermore, these approaches lack adoptable user implementation. In this paper, various approaches and techniques that were introduced in the past for the purpose of enhancing the authentication and authorization of the user while performing sensitive and confidential transaction are discussed. Each of works performed by the researchers is taken single-handedly for debate followed by analysis. Finally, the open issues in the current domain of study are formulated from the review conducted. |
doi_str_mv | 10.14569/IJACSA.2015.060826 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2656511779</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2656511779</sourcerecordid><originalsourceid>FETCH-LOGICAL-c252t-f44bb47ded4d6f1cda2ad4364932989ebbd821f692014e74836e0b1bfe3b1e1b3</originalsourceid><addsrcrecordid>eNotkF1LwzAUhoMoOOZ-gTcBrzvz1bS9LGXqZENhCt6FpD2RjrWpSSbs39utnpv3XDy8h_MgdE_JkopUFo_r17LalUtGaLokkuRMXqEZo6lM0jQj15c9TyjJvm7RIoQ9GYcXTOZ8hlTl-gjdcNCxdT12Fq-shTq2v4B3UB99G094CzocPQTc9risawgBb3Wvv6GDPmLrXYfLxg1Rm_Zw5t_Bh2EquUM3Vh8CLP5zjj6fVh_VS7J5e15X5SapWcpiYoUwRmQNNKKRltaNZroRXIqCsyIvwJgmZ9TKYnxSQCZyLoEYaixwQ4EaPkcPU-_g3c8RQlR7d_T9eFIxmcqU0iwrRopPVO1dCB6sGnzbaX9SlKiLTDXJVGeZapLJ_wB0dmke</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2656511779</pqid></control><display><type>article</type><title>Contemplation of Effective Security Measures in Access Management from Adoptability Perspective</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Mehraj, Tehseen ; Rasool, Bisma ; Ul, Burhan ; Baba, Asifa ; A., Prof</creator><creatorcontrib>Mehraj, Tehseen ; Rasool, Bisma ; Ul, Burhan ; Baba, Asifa ; A., Prof</creatorcontrib><description>With the extension in computer networks, there has been a drastic change in the disposition of network security. Security has always been a major concern of any organization as it involves mechanisms to ensure reliable access. In the present era of global electronic connectivity where hackers, eavesdroppers, electronic frauds, viruses are growing in number, security has proved to be indispensable. Although numerous solutions have been put forth in literature to guarantee security, they have botched with related traits like efficiency and scalability. Despite the range of security solutions that have been presented by experts, not a single approach has been wholly agreed upon to provide absolute security or standardized upon unanimously. Furthermore, these approaches lack adoptable user implementation. In this paper, various approaches and techniques that were introduced in the past for the purpose of enhancing the authentication and authorization of the user while performing sensitive and confidential transaction are discussed. Each of works performed by the researchers is taken single-handedly for debate followed by analysis. Finally, the open issues in the current domain of study are formulated from the review conducted.</description><identifier>ISSN: 2158-107X</identifier><identifier>EISSN: 2156-5570</identifier><identifier>DOI: 10.14569/IJACSA.2015.060826</identifier><language>eng</language><publisher>West Yorkshire: Science and Information (SAI) Organization Limited</publisher><subject>Access control ; Computer networks ; Eavesdropping ; Network security</subject><ispartof>International journal of advanced computer science & applications, 2015-01, Vol.6 (8)</ispartof><rights>2015. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c252t-f44bb47ded4d6f1cda2ad4364932989ebbd821f692014e74836e0b1bfe3b1e1b3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>Mehraj, Tehseen</creatorcontrib><creatorcontrib>Rasool, Bisma</creatorcontrib><creatorcontrib>Ul, Burhan</creatorcontrib><creatorcontrib>Baba, Asifa</creatorcontrib><creatorcontrib>A., Prof</creatorcontrib><title>Contemplation of Effective Security Measures in Access Management from Adoptability Perspective</title><title>International journal of advanced computer science & applications</title><description>With the extension in computer networks, there has been a drastic change in the disposition of network security. Security has always been a major concern of any organization as it involves mechanisms to ensure reliable access. In the present era of global electronic connectivity where hackers, eavesdroppers, electronic frauds, viruses are growing in number, security has proved to be indispensable. Although numerous solutions have been put forth in literature to guarantee security, they have botched with related traits like efficiency and scalability. Despite the range of security solutions that have been presented by experts, not a single approach has been wholly agreed upon to provide absolute security or standardized upon unanimously. Furthermore, these approaches lack adoptable user implementation. In this paper, various approaches and techniques that were introduced in the past for the purpose of enhancing the authentication and authorization of the user while performing sensitive and confidential transaction are discussed. Each of works performed by the researchers is taken single-handedly for debate followed by analysis. Finally, the open issues in the current domain of study are formulated from the review conducted.</description><subject>Access control</subject><subject>Computer networks</subject><subject>Eavesdropping</subject><subject>Network security</subject><issn>2158-107X</issn><issn>2156-5570</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNotkF1LwzAUhoMoOOZ-gTcBrzvz1bS9LGXqZENhCt6FpD2RjrWpSSbs39utnpv3XDy8h_MgdE_JkopUFo_r17LalUtGaLokkuRMXqEZo6lM0jQj15c9TyjJvm7RIoQ9GYcXTOZ8hlTl-gjdcNCxdT12Fq-shTq2v4B3UB99G094CzocPQTc9risawgBb3Wvv6GDPmLrXYfLxg1Rm_Zw5t_Bh2EquUM3Vh8CLP5zjj6fVh_VS7J5e15X5SapWcpiYoUwRmQNNKKRltaNZroRXIqCsyIvwJgmZ9TKYnxSQCZyLoEYaixwQ4EaPkcPU-_g3c8RQlR7d_T9eFIxmcqU0iwrRopPVO1dCB6sGnzbaX9SlKiLTDXJVGeZapLJ_wB0dmke</recordid><startdate>20150101</startdate><enddate>20150101</enddate><creator>Mehraj, Tehseen</creator><creator>Rasool, Bisma</creator><creator>Ul, Burhan</creator><creator>Baba, Asifa</creator><creator>A., Prof</creator><general>Science and Information (SAI) Organization Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7XB</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20150101</creationdate><title>Contemplation of Effective Security Measures in Access Management from Adoptability Perspective</title><author>Mehraj, Tehseen ; Rasool, Bisma ; Ul, Burhan ; Baba, Asifa ; A., Prof</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c252t-f44bb47ded4d6f1cda2ad4364932989ebbd821f692014e74836e0b1bfe3b1e1b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Access control</topic><topic>Computer networks</topic><topic>Eavesdropping</topic><topic>Network security</topic><toplevel>online_resources</toplevel><creatorcontrib>Mehraj, Tehseen</creatorcontrib><creatorcontrib>Rasool, Bisma</creatorcontrib><creatorcontrib>Ul, Burhan</creatorcontrib><creatorcontrib>Baba, Asifa</creatorcontrib><creatorcontrib>A., Prof</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of advanced computer science & applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mehraj, Tehseen</au><au>Rasool, Bisma</au><au>Ul, Burhan</au><au>Baba, Asifa</au><au>A., Prof</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Contemplation of Effective Security Measures in Access Management from Adoptability Perspective</atitle><jtitle>International journal of advanced computer science & applications</jtitle><date>2015-01-01</date><risdate>2015</risdate><volume>6</volume><issue>8</issue><issn>2158-107X</issn><eissn>2156-5570</eissn><abstract>With the extension in computer networks, there has been a drastic change in the disposition of network security. Security has always been a major concern of any organization as it involves mechanisms to ensure reliable access. In the present era of global electronic connectivity where hackers, eavesdroppers, electronic frauds, viruses are growing in number, security has proved to be indispensable. Although numerous solutions have been put forth in literature to guarantee security, they have botched with related traits like efficiency and scalability. Despite the range of security solutions that have been presented by experts, not a single approach has been wholly agreed upon to provide absolute security or standardized upon unanimously. Furthermore, these approaches lack adoptable user implementation. In this paper, various approaches and techniques that were introduced in the past for the purpose of enhancing the authentication and authorization of the user while performing sensitive and confidential transaction are discussed. Each of works performed by the researchers is taken single-handedly for debate followed by analysis. Finally, the open issues in the current domain of study are formulated from the review conducted.</abstract><cop>West Yorkshire</cop><pub>Science and Information (SAI) Organization Limited</pub><doi>10.14569/IJACSA.2015.060826</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2158-107X |
ispartof | International journal of advanced computer science & applications, 2015-01, Vol.6 (8) |
issn | 2158-107X 2156-5570 |
language | eng |
recordid | cdi_proquest_journals_2656511779 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Access control Computer networks Eavesdropping Network security |
title | Contemplation of Effective Security Measures in Access Management from Adoptability Perspective |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T10%3A58%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Contemplation%20of%20Effective%20Security%20Measures%20in%20Access%20Management%20from%20Adoptability%20Perspective&rft.jtitle=International%20journal%20of%20advanced%20computer%20science%20&%20applications&rft.au=Mehraj,%20Tehseen&rft.date=2015-01-01&rft.volume=6&rft.issue=8&rft.issn=2158-107X&rft.eissn=2156-5570&rft_id=info:doi/10.14569/IJACSA.2015.060826&rft_dat=%3Cproquest_cross%3E2656511779%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2656511779&rft_id=info:pmid/&rfr_iscdi=true |