Detection & Prevention of Unauthorized User through Policy Server for a Network

Abstract

Now a day’s Accessing the information all over the world is very fast & quick. Accessing the information is done over the internet. Industry & various organizations are facing access management problems that require new level of protection to resource. Access Management suit are the most advance, Secure, Reliable solutions that are use for securing data , Web services & Resource form unauthorized user. Access Management is the strong authentication and authorization solution that is available for e-business, Operating Systems & Business Integration. The Access Management for e-business is the secure the web environment of the industry. Access Management for e-business is providing strong authentication and authorization solution using WebSEAL, & policy-based approach to identify who can access the resource at what level. This paper will propose how the detection & prevention of unauthorized user through policy server for a network.

Authors and Affiliations

Avinash Y. Surywanshi, Prof. Priti Subramanium

Keywords

Related Articles

Data Possession Using Shipment Equilibrium Model And Mechanism on Multi cloud Environment

Shipment equilibrium mechanism is the main building blocks for cloud computing applications which is based on the Map Reduce programming concept. Shipment equilibrium is essential for efficient operations in distribu...

Energy efficient cluster based approach in wireless Ad-hoc networks: Survey

A mobile ad-hoc network (MANET) is a collection of different mobile nodes. These nodes can communicate with each other over wireless networks using wireless links. The energy saving is an important challenge of wirel...

A New Approach On Incremntal Affinity Propagation Clustering Technique Based On Preference

Many of the clustering algorithms were intended for discovering patterns in static data. Nowadays, more and more data e.g., blogs, Web pages, video surveillance, etc., are come into view in dynamic manner, known as d...

Para-Scheduling Algorithm for Architectural Framework of Virtual Computing Lab

Our main concern in private cloud computing is to provide sufficient computing resources on demand, however in current architectures like eucalyptus, cluster controller is the sole provider of virtual machines to the...

Storage Correctness Verification and Data Regaining In Cloud

Users no longer hold physical possession of the outsourced data makes the data integrity protection in cloud computing a formidable task particularly for users with constrained computing resources. Moreover users sho...

Download PDF file
  • EP ID EP27956
  • DOI -
  • Views 200
  • Downloads 0

How To Cite

Avinash Y. Surywanshi, Prof. Priti Subramanium (2014). Detection & Prevention of Unauthorized User through Policy Server for a Network. International Journal of Research in Computer and Communication Technology, 3(7), -. https://europub.co.uk/articles/-A-27956