A Survey on Data Security & Computer Networks.
Journal Title: International Journal of Engineering, Science and Mathematics - Year 2012, Vol 2, Issue 6
Abstract
This research deals with data security in distributed and client/server computer systems, placing special emphasis on access security. The paper presents the subject of data security & computer Networks in these systems by describing them, examining their vulnerable points and presenting adequate solutions. The paper includes a survey on the subject of authorization, authentication, encryption and access control, the main components in data security management of distributed systems. In addition to a survey and analysis of data security management aspects, a plan of an access security system based on client/server architecture is presented, which may be combined with applications requiring access security services. The model describes the access security server and the interface for access security which is combined with the application and constitutes the client portion. Unlike research carried out to date which mainly integrates existing techniques and approaches (White 1999, Burleson 1998, Gayness 2000)? This research offers an innovative approach on the subject of data security management through the development of a unique access security Model. Furthermore, in view of the increasing importance and intensive use of data security management technology, and the special attention paid to the various aspects connected with data security management, this research is of special importance from the theoretical and applicative points of view.
Authors and Affiliations
Mr. Shashiraj Teotia, Mr. Ravi Punia and Mrs. Monisha Awasthi
Factors of default in Small and Medium Enterprise: an Application of Cluster Analysis
Lending activity is an integral part of the banking business. Howsoever good a bank may be in its credit management it cannot escape the natural laws operating within the dynamics of advance and recovery. To put in mor...
AN EFFICIENT ROUTING SCHEME FOR ICMN
In this paper, intermittently connected mobile networks are sparse wireless networks where most of the time there does not exist a complete path from the source to the destination. These networks fall into the general...
Employee Retention: Love them or loose them
Employee retention has become a major concern for organizations of any nature. Employee attrition is a costly dilemma for all organizations. In one of the survey it was found that 90% of those firms surveyed said it wa...
E-Commerce online payment security issues discussion and analysis
Nowadays electronic commerce services have risen to become more ... The handling of the payment may involve many ways, such as online banking. Computer network technology is developing fairly rapidly. With the Internet...
A NEW SYMMETRICAL ENCRYPTION ALGORITHM WITH HIGH SECURITYAND DATA RATE FOR WLAN
The hacking is the greatest problem in the wireless local area network (WLAN). Many algorithms like DES, 3DES, AES,CAST, UMARAM and RC6 have been used to prevent the outside attacks to eavesdrop or prevent the data to...