Detection & Prevention of Unauthorized User through Policy Server for a Network

Abstract

Now a day’s Accessing the information all over the world is very fast & quick. Accessing the information is done over the internet. Industry & various organizations are facing access management problems that require new level of protection to resource. Access Management suit are the most advance, Secure, Reliable solutions that are use for securing data , Web services & Resource form unauthorized user. Access Management is the strong authentication and authorization solution that is available for e-business, Operating Systems & Business Integration. The Access Management for e-business is the secure the web environment of the industry. Access Management for e-business is providing strong authentication and authorization solution using WebSEAL, & policy-based approach to identify who can access the resource at what level. This paper will propose how the detection & prevention of unauthorized user through policy server for a network.

Authors and Affiliations

Avinash Y. Surywanshi, Prof. Priti Subramanium

Keywords

Related Articles

Sprinkling Data Prevents From Intruders

The habitual communication of delay-tolerantnetwork (DTN) model is having partial infrastructural model for prevailing mobile patronsfor instance Bluetooth and Wi-Fi Direct. Mobile ad hoc network is an anthology of mo...

Text Clustering Using Cosine Similarity and Matrix Factorization

Clustering is a useful technique that organizes a large quantity of unordered text documents into a small number of meaningful and coherent clusters, thereby providing a basis for intuitive and informative navigation...

Self-assured Data Arrangement within Information Exhaustive Wireless Sensor Correlation

In the corpulent number of outgrowing viable environment each and everything depends on the other sources to transmit the data securely and maintain the data as well in the familiar medium. Transferable nodes in mili...

VISION SYSTEM FOR HUMAN LEVELOF INTELLIGENCE

In this competitive world both industrial and academic organizations have been using different learning techniques to improve their knowledge capabilities. However the dynamic change in modern knowledge makes learners...

Optimize Energy Consumption with priority forwarder list in Wireless Sensor Networks

Opportunistic routing always useful to increase the network throughput by forwarding the packets to the nodes which are nearer to the destination node. These nodes are called as forwarder listed nodes during the tran...

Download PDF file
  • EP ID EP27956
  • DOI -
  • Views 232
  • Downloads 0

How To Cite

Avinash Y. Surywanshi, Prof. Priti Subramanium (2014). Detection & Prevention of Unauthorized User through Policy Server for a Network. International Journal of Research in Computer and Communication Technology, 3(7), -. https://europub.co.uk/articles/-A-27956