Contemplation of Effective Security Measures in Access Management from Adoptability Perspective

With the extension in computer networks, there has been a drastic change in the disposition of network security. Security has always been a major concern of any organization as it involves mechanisms to ensure reliable access. In the present era of global electronic connectivity where hackers, eaves...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of advanced computer science & applications 2015-01, Vol.6 (8)
Hauptverfasser: Mehraj, Tehseen, Rasool, Bisma, Ul, Burhan, Baba, Asifa, A., Prof
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 8
container_start_page
container_title International journal of advanced computer science & applications
container_volume 6
creator Mehraj, Tehseen
Rasool, Bisma
Ul, Burhan
Baba, Asifa
A., Prof
description With the extension in computer networks, there has been a drastic change in the disposition of network security. Security has always been a major concern of any organization as it involves mechanisms to ensure reliable access. In the present era of global electronic connectivity where hackers, eavesdroppers, electronic frauds, viruses are growing in number, security has proved to be indispensable. Although numerous solutions have been put forth in literature to guarantee security, they have botched with related traits like efficiency and scalability. Despite the range of security solutions that have been presented by experts, not a single approach has been wholly agreed upon to provide absolute security or standardized upon unanimously. Furthermore, these approaches lack adoptable user implementation. In this paper, various approaches and techniques that were introduced in the past for the purpose of enhancing the authentication and authorization of the user while performing sensitive and confidential transaction are discussed. Each of works performed by the researchers is taken single-handedly for debate followed by analysis. Finally, the open issues in the current domain of study are formulated from the review conducted.
doi_str_mv 10.14569/IJACSA.2015.060826
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2656511779</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2656511779</sourcerecordid><originalsourceid>FETCH-LOGICAL-c252t-f44bb47ded4d6f1cda2ad4364932989ebbd821f692014e74836e0b1bfe3b1e1b3</originalsourceid><addsrcrecordid>eNotkF1LwzAUhoMoOOZ-gTcBrzvz1bS9LGXqZENhCt6FpD2RjrWpSSbs39utnpv3XDy8h_MgdE_JkopUFo_r17LalUtGaLokkuRMXqEZo6lM0jQj15c9TyjJvm7RIoQ9GYcXTOZ8hlTl-gjdcNCxdT12Fq-shTq2v4B3UB99G094CzocPQTc9risawgBb3Wvv6GDPmLrXYfLxg1Rm_Zw5t_Bh2EquUM3Vh8CLP5zjj6fVh_VS7J5e15X5SapWcpiYoUwRmQNNKKRltaNZroRXIqCsyIvwJgmZ9TKYnxSQCZyLoEYaixwQ4EaPkcPU-_g3c8RQlR7d_T9eFIxmcqU0iwrRopPVO1dCB6sGnzbaX9SlKiLTDXJVGeZapLJ_wB0dmke</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2656511779</pqid></control><display><type>article</type><title>Contemplation of Effective Security Measures in Access Management from Adoptability Perspective</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Mehraj, Tehseen ; Rasool, Bisma ; Ul, Burhan ; Baba, Asifa ; A., Prof</creator><creatorcontrib>Mehraj, Tehseen ; Rasool, Bisma ; Ul, Burhan ; Baba, Asifa ; A., Prof</creatorcontrib><description>With the extension in computer networks, there has been a drastic change in the disposition of network security. Security has always been a major concern of any organization as it involves mechanisms to ensure reliable access. In the present era of global electronic connectivity where hackers, eavesdroppers, electronic frauds, viruses are growing in number, security has proved to be indispensable. Although numerous solutions have been put forth in literature to guarantee security, they have botched with related traits like efficiency and scalability. Despite the range of security solutions that have been presented by experts, not a single approach has been wholly agreed upon to provide absolute security or standardized upon unanimously. Furthermore, these approaches lack adoptable user implementation. In this paper, various approaches and techniques that were introduced in the past for the purpose of enhancing the authentication and authorization of the user while performing sensitive and confidential transaction are discussed. Each of works performed by the researchers is taken single-handedly for debate followed by analysis. Finally, the open issues in the current domain of study are formulated from the review conducted.</description><identifier>ISSN: 2158-107X</identifier><identifier>EISSN: 2156-5570</identifier><identifier>DOI: 10.14569/IJACSA.2015.060826</identifier><language>eng</language><publisher>West Yorkshire: Science and Information (SAI) Organization Limited</publisher><subject>Access control ; Computer networks ; Eavesdropping ; Network security</subject><ispartof>International journal of advanced computer science &amp; applications, 2015-01, Vol.6 (8)</ispartof><rights>2015. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c252t-f44bb47ded4d6f1cda2ad4364932989ebbd821f692014e74836e0b1bfe3b1e1b3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>Mehraj, Tehseen</creatorcontrib><creatorcontrib>Rasool, Bisma</creatorcontrib><creatorcontrib>Ul, Burhan</creatorcontrib><creatorcontrib>Baba, Asifa</creatorcontrib><creatorcontrib>A., Prof</creatorcontrib><title>Contemplation of Effective Security Measures in Access Management from Adoptability Perspective</title><title>International journal of advanced computer science &amp; applications</title><description>With the extension in computer networks, there has been a drastic change in the disposition of network security. Security has always been a major concern of any organization as it involves mechanisms to ensure reliable access. In the present era of global electronic connectivity where hackers, eavesdroppers, electronic frauds, viruses are growing in number, security has proved to be indispensable. Although numerous solutions have been put forth in literature to guarantee security, they have botched with related traits like efficiency and scalability. Despite the range of security solutions that have been presented by experts, not a single approach has been wholly agreed upon to provide absolute security or standardized upon unanimously. Furthermore, these approaches lack adoptable user implementation. In this paper, various approaches and techniques that were introduced in the past for the purpose of enhancing the authentication and authorization of the user while performing sensitive and confidential transaction are discussed. Each of works performed by the researchers is taken single-handedly for debate followed by analysis. Finally, the open issues in the current domain of study are formulated from the review conducted.</description><subject>Access control</subject><subject>Computer networks</subject><subject>Eavesdropping</subject><subject>Network security</subject><issn>2158-107X</issn><issn>2156-5570</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNotkF1LwzAUhoMoOOZ-gTcBrzvz1bS9LGXqZENhCt6FpD2RjrWpSSbs39utnpv3XDy8h_MgdE_JkopUFo_r17LalUtGaLokkuRMXqEZo6lM0jQj15c9TyjJvm7RIoQ9GYcXTOZ8hlTl-gjdcNCxdT12Fq-shTq2v4B3UB99G094CzocPQTc9risawgBb3Wvv6GDPmLrXYfLxg1Rm_Zw5t_Bh2EquUM3Vh8CLP5zjj6fVh_VS7J5e15X5SapWcpiYoUwRmQNNKKRltaNZroRXIqCsyIvwJgmZ9TKYnxSQCZyLoEYaixwQ4EaPkcPU-_g3c8RQlR7d_T9eFIxmcqU0iwrRopPVO1dCB6sGnzbaX9SlKiLTDXJVGeZapLJ_wB0dmke</recordid><startdate>20150101</startdate><enddate>20150101</enddate><creator>Mehraj, Tehseen</creator><creator>Rasool, Bisma</creator><creator>Ul, Burhan</creator><creator>Baba, Asifa</creator><creator>A., Prof</creator><general>Science and Information (SAI) Organization Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7XB</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20150101</creationdate><title>Contemplation of Effective Security Measures in Access Management from Adoptability Perspective</title><author>Mehraj, Tehseen ; Rasool, Bisma ; Ul, Burhan ; Baba, Asifa ; A., Prof</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c252t-f44bb47ded4d6f1cda2ad4364932989ebbd821f692014e74836e0b1bfe3b1e1b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Access control</topic><topic>Computer networks</topic><topic>Eavesdropping</topic><topic>Network security</topic><toplevel>online_resources</toplevel><creatorcontrib>Mehraj, Tehseen</creatorcontrib><creatorcontrib>Rasool, Bisma</creatorcontrib><creatorcontrib>Ul, Burhan</creatorcontrib><creatorcontrib>Baba, Asifa</creatorcontrib><creatorcontrib>A., Prof</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of advanced computer science &amp; applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mehraj, Tehseen</au><au>Rasool, Bisma</au><au>Ul, Burhan</au><au>Baba, Asifa</au><au>A., Prof</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Contemplation of Effective Security Measures in Access Management from Adoptability Perspective</atitle><jtitle>International journal of advanced computer science &amp; applications</jtitle><date>2015-01-01</date><risdate>2015</risdate><volume>6</volume><issue>8</issue><issn>2158-107X</issn><eissn>2156-5570</eissn><abstract>With the extension in computer networks, there has been a drastic change in the disposition of network security. Security has always been a major concern of any organization as it involves mechanisms to ensure reliable access. In the present era of global electronic connectivity where hackers, eavesdroppers, electronic frauds, viruses are growing in number, security has proved to be indispensable. Although numerous solutions have been put forth in literature to guarantee security, they have botched with related traits like efficiency and scalability. Despite the range of security solutions that have been presented by experts, not a single approach has been wholly agreed upon to provide absolute security or standardized upon unanimously. Furthermore, these approaches lack adoptable user implementation. In this paper, various approaches and techniques that were introduced in the past for the purpose of enhancing the authentication and authorization of the user while performing sensitive and confidential transaction are discussed. Each of works performed by the researchers is taken single-handedly for debate followed by analysis. Finally, the open issues in the current domain of study are formulated from the review conducted.</abstract><cop>West Yorkshire</cop><pub>Science and Information (SAI) Organization Limited</pub><doi>10.14569/IJACSA.2015.060826</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2158-107X
ispartof International journal of advanced computer science & applications, 2015-01, Vol.6 (8)
issn 2158-107X
2156-5570
language eng
recordid cdi_proquest_journals_2656511779
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Access control
Computer networks
Eavesdropping
Network security
title Contemplation of Effective Security Measures in Access Management from Adoptability Perspective
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T10%3A58%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Contemplation%20of%20Effective%20Security%20Measures%20in%20Access%20Management%20from%20Adoptability%20Perspective&rft.jtitle=International%20journal%20of%20advanced%20computer%20science%20&%20applications&rft.au=Mehraj,%20Tehseen&rft.date=2015-01-01&rft.volume=6&rft.issue=8&rft.issn=2158-107X&rft.eissn=2156-5570&rft_id=info:doi/10.14569/IJACSA.2015.060826&rft_dat=%3Cproquest_cross%3E2656511779%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2656511779&rft_id=info:pmid/&rfr_iscdi=true