Contemplation of Effective Security Measures in Access Management from Adoptability Perspective
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 8
Abstract
With the extension in computer networks, there has been a drastic change in the disposition of network security. Security has always been a major concern of any organization as it involves mechanisms to ensure reliable access. In the present era of global electronic connectivity where hackers, eavesdroppers, electronic frauds, viruses are growing in number, security has proved to be indispensable. Although numerous solutions have been put forth in literature to guarantee security, they have botched with related traits like efficiency and scalability. Despite the range of security solutions that have been presented by experts, not a single approach has been wholly agreed upon to provide absolute security or standardized upon unanimously. Furthermore, these approaches lack adoptable user implementation. In this paper, various approaches and techniques that were introduced in the past for the purpose of enhancing the authentication and authorization of the user while performing sensitive and confidential transaction are discussed. Each of works performed by the researchers is taken single-handedly for debate followed by analysis. Finally, the open issues in the current domain of study are formulated from the review conducted.
Authors and Affiliations
Tehseen Mehraj, Bisma Rasool, Burhan Khan, Asifa Baba, Prof. A. Lone
Scheduling in Desktop Grid Systems: Theoretical Evaluation of Policies & Frameworks
Desktop grid systems have already established their identity in the area of distributed systems. They are well suited for High Throughput Computing especially for Bag-of-Tasks applications. In desktop grid systems, idle...
Norm’s Trust Model to Evaluate Norms Benefit Awareness for Norm Adoption in an Open Agent Community
In recent developments, norms have become important entities that are considered in agent-based systems’ designs. Norms are not only able to organize and coordinate the actions and behaviour of agents but have a direct i...
An Algorithmic approach for abstracting transient states in timed systems
In previous works, the timed logic TCTL was extended with importants modalities, in order to abstract transient states that last for less than k time units. For all modalities of this extension, called TCTL?, the decidab...
Smart Rubric-based Systematic Model for Evaluating and Prioritizing Academic Practices to Enhance the Education Outcomes
Recently, the impact of free-market economy, globalization, and knowledge economy has become a challenging and focal to higher educational institutions, which resulted in radical change. Therefore, it became mandatory fo...
RPOA Model-Based Optimal Resource Provisioning
Optimal utilization of resources is the core of the provisioning process in the cloud computing. Sometimes the local resources of a data center are not adequate to satisfy the users’ requirements. So, the providers need...