CFP last date
22 April 2024
Reseach Article

A Novel Security Approach for Access Model

by Teena Jaiswal, Umesh Kumar Singh, Shabana Sheikh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 138 - Number 9
Year of Publication: 2016
Authors: Teena Jaiswal, Umesh Kumar Singh, Shabana Sheikh
10.5120/ijca2016908953

Teena Jaiswal, Umesh Kumar Singh, Shabana Sheikh . A Novel Security Approach for Access Model. International Journal of Computer Applications. 138, 9 ( March 2016), 25-30. DOI=10.5120/ijca2016908953

@article{ 10.5120/ijca2016908953,
author = { Teena Jaiswal, Umesh Kumar Singh, Shabana Sheikh },
title = { A Novel Security Approach for Access Model },
journal = { International Journal of Computer Applications },
issue_date = { March 2016 },
volume = { 138 },
number = { 9 },
month = { March },
year = { 2016 },
issn = { 0975-8887 },
pages = { 25-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume138/number9/24408-2016908953/ },
doi = { 10.5120/ijca2016908953 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:39:32.836070+05:30
%A Teena Jaiswal
%A Umesh Kumar Singh
%A Shabana Sheikh
%T A Novel Security Approach for Access Model
%J International Journal of Computer Applications
%@ 0975-8887
%V 138
%N 9
%P 25-30
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In vision of the importance of researcher’s sharing the same theory of network security, this paper suggests a novel security approach for network security in which network security issues can be treated essentially. The meaning of network security has been identified for some time, but provides networks (especially public networks) with security utilities has proven difficult. The act of the network itself in computer network security has been minimum , as systems certainly preserve their own security. To resolve such problems, this paper recommends a network security approach for the access model.

References
  1. Bell D.E. and LaPadulaL.J.,"Secure Computer System:Unified Exposition and Multics Interpretation", MiterMTR-2997(March 1976)
  2. SynderL.,"Formal Models of Capability-BasedProtectionSystems", IEEE Trans. on Computers, C30,3,pp.172-181(March 1981).
  3. Clark D.D. and Wilson D.R.,"A Comparison of Commercial and Military Computer Security Policies",IEEESymp.on Security and Privacy, pp.184-194 (1987).
  4. Brewer D.F.C. and Nash M.J.,"TheChineseWallSecurityPolicy", IEEE Symp. on security and Privacy, pp.206-214 (1989)
  5. Robert Koch, Björn Stelte, Mario Golling, “Attack Trends in Present Computer Networks”, 4th International Conference on Cyber ConflictC. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 .
  6. D. Denning, Information Warfare and Security,P163-183, Addison-Wesley Publishers, 1999.
  7. K. An Liu,R. Peng Ning, D. Maughan, Securing Network Access in Wireless Sensor Networks, WiSec’09, March 16 9,2009, Zurich, Switzerland. Copyright 2009 ACM 978-1- 60558-460-7/09/03
  8. Y. Y. Carsten Maple, "Reliability, Availability and Security of Wireless Networks in the Community," Informatica, p. 8, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Access policy network security VPN Close User Group Wireless sensor network.