Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.
Digital Object Identifier (DOI) : 10.14569/IJACSA.2015.060826
Article Published in International Journal of Advanced Computer Science and Applications(IJACSA), Volume 6 Issue 8, 2015.
Abstract: With the extension in computer networks, there has been a drastic change in the disposition of network security. Security has always been a major concern of any organization as it involves mechanisms to ensure reliable access. In the present era of global electronic connectivity where hackers, eavesdroppers, electronic frauds, viruses are growing in number, security has proved to be indispensable. Although numerous solutions have been put forth in literature to guarantee security, they have botched with related traits like efficiency and scalability. Despite the range of security solutions that have been presented by experts, not a single approach has been wholly agreed upon to provide absolute security or standardized upon unanimously. Furthermore, these approaches lack adoptable user implementation. In this paper, various approaches and techniques that were introduced in the past for the purpose of enhancing the authentication and authorization of the user while performing sensitive and confidential transaction are discussed. Each of works performed by the researchers is taken single-handedly for debate followed by analysis. Finally, the open issues in the current domain of study are formulated from the review conducted.
Tehseen Mehraj, Bisma Rasool, Burhan Ul Islam Khan, Asifa Baba and Prof. A. G. Lone, “Contemplation of Effective Security Measures in Access Management from Adoptability Perspective” International Journal of Advanced Computer Science and Applications(IJACSA), 6(8), 2015. http://dx.doi.org/10.14569/IJACSA.2015.060826